Images List Premium Download Classic

Digital Signature

Digital Signature-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Efficient encryption, escrow and digital signatures
Authentify, Inc.
December 31, 2015 - N°20150381608

A network server is operated so as to facilitate legal eavesdropping by receiving, from the first user via a network, a session key (sk) encrypted with a second user's public key, kpubu2, and the sk encrypted with an escrow server's (es) public key, kpubes. The kpubu2 key is the public key of the second user asymmetric private/public key pair ...
System and method to use a cloud-based platform supported by an api to authenticate remote ...
Authentify, Inc.
December 31, 2015 - N°20150381580

Through use of an api such entities may optionally use their own public key infrastructure (pki) and privilege management infrastructure (pmi) components (such as: registration authority, ra; certification authority, ca; hardware security module, hsm) and access through a provided api to a platform which integrates its own pki and pmi and attribute authority (aa) or alternatively, a platform (via an ...
Revocation of public key infrastructure signatures
Cisco Technology, Inc.
December 31, 2015 - N°20150381375

In one implementation, a public key infrastructure utilizes a two stage revocation process for a set of data. One stage authenticates or revokes the set of data based on the status of the digital signature and another stage authenticates or revokes the set of data based on the status of an individual signature by the digital certificate. For example, a ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Dnssec signing server
Verisign, Inc.
December 24, 2015 - N°20150372822

Systems and methods for performing dnssec signing are described in which digital signature operations may be performed by a network accessible signing server that is configured to interact with a separate client application. Exemplary methods may include receiving a signing request at the signing server from the client application to sign first data. The signing server may determine an active ...
Monitoring signed resources transferred over a network
Bmc Software, Inc.
December 24, 2015 - N°20150372821

A system for monitoring resources transferred over a network includes a capture module that is configured to capture content transferred over a network between a requestor device and a server device. The content includes a resource, a digital signature associated with the resource and a digital certificate associated with the digital signature. The system includes a resource monitor module that ...
Security information for software parts
The Boeing Company
December 10, 2015 - N°20150356319

A system and method of identifying a security policy for a software part. Security information for the software part is signed with a security information digital signature to form signed security information. The security information identifies a security policy for the software part. The signed security information is associated with the software part.
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Rfid tag and method for operating an rfid tag
Siemens Aktiengesellschaft
November 26, 2015 - N°20150341343

The invention relates to an rfid tag, which comprises a receiving means, a first and a second verification means, and a transmitting means. The receiving means is designed to receive a challenge message sent by an rfid reading device. Said challenge message comprises a challenge data set, which has a digital certificate issued for the rfid reading device by a ...
Digitally signing json messages
Vmware, Inc.
November 26, 2015 - N°20150341176

Systems and techniques are described for digitally signing javascript object notation (json) messages. One of the techniques includes receiving a javascript object notation (json) message; and digitally signing the json message, wherein digitally signing the json message comprises: generating a digital signature information json object; inserting the digital signature information json object into the json message; generating a canonical representation ...
Id system and program, and id method
Vmware, Inc.
November 19, 2015 - N°20150333911

[means for solving problems] a server device includes: a unit for encrypting information for requesting biometric authentication and identifying the request by using a public key of the biometric authentication device and transmitting the information; and a unit for authenticating the user according to the authentication information containing the result of the biometric authentication. The biometric authentication device includes: a ...
System and method for parts-based digital rights management
Adobe Systems Incorporated
November 19, 2015 - N°20150332178

Various embodiments of a system and method for parts-based digital rights management are described. Various embodiments may include a digital rights management component configured to receive content comprising a plurality of portions of content. The digital rights management component may also receive a license for the encrypted content; the license may include a plurality of permissions each specific to a ...
Provisioning drm credentials on a client device using an update server
Arris Enterprises, Inc.
November 12, 2015 - N°20150326563

A method of provisioning drm credentials on a client device, comprising receiving drm credentials at an update server from a key generation system, the drm credentials having been encrypted by the key generation system, receiving a drm credential request from a client device, the drm credential request comprising a digital signature, a device class certificate, and an authorization token, authenticating ...
Method and system for email identity validation
Certipath, Inc.
November 12, 2015 - N°20150326399

The present invention uses server-based certificate validation protocol (scvp) to validate the public key digital signature certificate of an email signer (or the public key encryption certificate of an email recipient) by using a modified scvp server such that a trustworthiness indicator based on certificate policies is included in an scvp server response that maps the certificate policies asserted in ...
Authentication processing apparatus, authentication processing system, authentication processing method and authentication processing program
Mitsubishi Electric Corporation
November 05, 2015 - N°20150318997

A communication apparatus sends a processing request, including request information, a digital signature, and an electronic certificate, to a control apparatus. The control apparatus sends a verification request including the electronic certificate to a verification server. The verification server verifies the electronic certificate included in the verification request, and sends authentication-use reference information, including the verification result, as a verification ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Remote station for deriving a derivative key in a system-on-a-chip device
Qualcomm Incorporated
October 29, 2015 - N°20150312228

An integrated circuit may comprise a processor configured to: receive a delegate certificate, wherein the delegate certificate includes a first public key; validate a digital signature of the delegate certificate using a second public key; and generate a derivative key using a secret key securely stored in the integrated circuit and using the first public key as inputs to a ...
Digital signature server and user terminal
Kabushiki Kaisha Toshiba
October 29, 2015 - N°20150312043

To reduce a load on a user terminal imposed when verifying signature data and at the same time reduce a load on a server, a signature key matrix km includes a plurality of signature keys ki-j arranged in a matrix structure of m rows and n columns, and is stored in a signature key matrix database 21. A correspondence relationship between ...
System and method for secure voting
E-government Consulting Group, Inc.
October 29, 2015 - N°20150310686

Methods, systems, and computer-readable media are provided for conducting an election. In one exemplary embodiment, there is provided a method for ensuring integrity of an electronic ballot. The method can include creating electronic ballots for voters based on votes received from the voters; digitally signing the electronic ballots; storing the signed electronic ballots; retrieving the signed electronic ballots from storage; ...
System and method for administering licenses stored by a product unit, and administration of said ...
Seed Labs Sp. Z O.o.
October 22, 2015 - N°20150304112

The product unit disclosed herein has identification data that are stored internally in memory. This stored identification data can be viewed as the product unit's “digital nameplate,” in that the data can represent the product unit's identifier, brand, and so on. Each data set is digitally signed while on the production line by using an encryption ...
System and method for administering licenses stored in an electronic module, and product unit comprising ...
Seed Labs Sp. Z O.o.
October 22, 2015 - N°20150302534

The product unit disclosed herein has identification data that are stored internally in memory. This stored identification data can be viewed as the product unit's “digital nameplate,” in that the data can represent the product unit's identifier, brand, and so on. Each data set is digitally signed while on the production line by using an encryption ...
Method and system for restricting execution of virtual application to a managed process environment
Code Systems Corporation
October 22, 2015 - N°20150302183

Methods and systems for restricting the launch of virtual application files. In one embodiment, a launching application is signed with a digital signature. When the launching application launches a runtime engine and instructs it to execute an application file, the runtime engine determines whether an entity identifier associated with the launching application identifies an authorized entity. If the entity identifier ...
Method and system for implementing digital signature in mobile operating system
Code Systems Corporation
October 15, 2015 - N°20150295718

A method and a system for implementing a digital signature in a mobile operating system. The method comprises: an application program coding to-be-signed data to obtain a first data packet; calling a preset system function by using an address character string of a service program, an address character string of an application program and the first data packet as parameters; ...
Elliptic curve point multiplication procedure resistant to side-channel information leakage
Code Systems Corporation
October 08, 2015 - N°20150288520

One feature pertains to elliptic curve (ec) point multiplication for use in generating digital signatures. In one aspect, a scalar multiplier k) of a base point (p) of order (n) is selected on an elliptic curve for use with ec point multiplication. An integer value (r) is then randomly generated from within a range of values constrained so that, regardless ...
Loading