Images List Premium Download Classic

Digital Signature

Digital Signature-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Method and system for identity and credential protection and verification via blockchain
Mastercard International Incorporated
April 12, 2018 - N°20180101684

A method for distributed storage of identity data includes: receiving entity data for a plurality of entities, the data including an associated public key, associated attributes, and a geographic jurisdiction, and where one entity is a subordinate; generating a data file for each entity including the associated attributes and public key, and where the subordinate entity's data file includes a ...
Network addresses with encoded dns-level information
Amazon Technologies, Inc.
April 05, 2018 - N°20180097831

Systems and methods are described to enable a dns service to encode information into a network address to be advertised by the dns service. Information encoded by a dns service may include, for example, an identifier of a content set to which the network address corresponds (e. G., a domain name) and validity information, such as a digital signature, that ...
Encrypted network addresses
Amazon Technologies, Inc.
April 05, 2018 - N°20180097634

Systems and methods are described to enable a dns service to encode information into a network address to be advertised by the dns service. Information encoded by a dns service may include, for example, an identifier of a content set to which the network address corresponds (e. G., a domain name) and validity information, such as a digital signature, that ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Techniques for secure authentication
Intel Corporation
April 05, 2018 - N°20180097630

Various embodiments are generally directed to techniques for secure message authentication and digital signatures, such as with a cipher-based hash function, for instance. Some embodiments are particularly directed to a secure authentication system that implements various aspects of the cipher-based hash function in dedicated hardware or circuitry. In various embodiments, the secure authentication system may implement one or more elements ...
Distribution of code to an authorized target infrastructure
Hewlett Packard Enterprise Development Lp
March 29, 2018 - N°20180091515

Examples herein disclose a computer-readable medium, system, and method for distribution of code to an authorized target infrastructure within a manufacturing environment. Prior to deployment of the target infrastructure, receive a digital signature corresponding to the target infrastructure. In response to a determination that the target infrastructure is authorized to receive code via the digital signature, distribute code to the ...
Apparatuses and methods for trusted module execution
Via Alliance Semiconductor Co., Ltd.
March 29, 2018 - N°20180091314

A computer system including a processor and a memory is provided. The memory is operatively coupled to the processor and is configured to store a trusted module and a digital certificate of the trusted module. The processor authenticates a digital signature of the digital certificate, and when the digital signature is successfully authenticated, authenticates the trusted module according to the ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Session negotiations
Amazon Technologies, Inc.
March 22, 2018 - N°20180083929

A plurality of devices are each operable to provide information that is usable for to prove authorization with any of the other devices. The devices may have common access to a cryptographic key. A device may use the cryptographic key to encrypt a session key and provide both the session key and the encrypted session key. Requests to any of ...
Deterring information copying including deterrence of currency counterfeiting
International Business Machines Corporation
March 15, 2018 - N°20180076963

A method for deterring information copying, includes: combining a watermark serial number incorporate in a given medium with a content serial number to create a combined serial number, the watermark serial number uniquely identifies the given medium, and the content serial number uniquely identifies a content stored on the given medium; creating a digital signature by encoding the combined serial ...
Dynamic provisioning of device configuration files for electronic subscriber identity modules
Apple Inc.
March 01, 2018 - N°20180063668

Representative embodiments described herein set forth techniques for provisioning device configuration files and electronic subscriber identity modules (esims) to mobile devices. One embodiment sets forth a method for installing an esim at a mobile device. According to some embodiments, the method includes the steps of (1) receiving a first request to obtain the esim, (2) issuing, to an esim server, a second ...
Rootkit detection system and method
Dell Products L.p.
March 01, 2018 - N°20180063166

A rootkit detection method includes obtaining, from a target system, first data comprising raw data stored in a data block of a storage drive, checking the first data for known malware, and generating a first alert if known malware is detected. The drive may include a public key, the first data may include a digital signature based on the key, ...
Asset authentication in a dynamic, proximity-based network of communication devices
Crunchfish Ab
March 01, 2018 - N°20180062851

Asset authentication in a dynamic, proximity-based network of communication devices, each having a first interface for establishing the dynamic, proximity-based network by short-range wireless beacon broadcast messaging, and a second interface for communicating with a server by broadband communication. A first communication device sends (210) via the first interface an authentication request to a second communication device having an associated asset. ...
Systems and methods for authenticating firmware stored on an integrated circuit
Altera Corporation
March 01, 2018 - N°20180060561

The invention discloses a method of authenticating data stored in an integrated circuit. The method includes storing randomized data in the integrated circuit such that the randomized data occupies each address space of the memory circuit that is not occupied by the stored data. The method also includes generating a first digital signature using the integrated circuit in response to ...
Digital signature using phonometry and compiled biometric data system and method
Bragi Gmbh
March 01, 2018 - N°20180060555

A system, method and one or more wireless earpieces for authenticating utilization of one or more wireless earpieces. A request is received through the one or more wireless earpieces. Biometric readings are performed for a user utilizing sensors of the one or more wireless earpieces. The biometric readings are analyzed to determine whether a biometric profile authorizes the one or ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Multiple secrets in quorum based data processing
Pq Solutions Limited
February 22, 2018 - N°20180054316

Methods are described for constructing a secret key by multiple participants such that any quorum combination of participants can generate a fixed number of key components that can be combined by a recipient to generate the secret key. The methods permit an identical secret key to be generated by a different sized quorum from different participants if required. The keys ...
Protecting data in memory of a consumable product
Hewlett-packard Development Company, L.p.
February 15, 2018 - N°20180046795

A non-transitory memory storing a digital signature of a consumable product where the digital signature indicates that an identifier and host device setting data are from a trusted source.
Systems and methods for delegated cryptography
Kryptco, Inc.
February 08, 2018 - N°20180041484

In some embodiments, an authentication method comprises receiving a request for a digital signature of data from a delegate computer over a secure channel using cryptography to provide authentication, wherein the secure channel comprises at least one wireless communications link; displaying information derived from the data; prompting a user for approval of the request with information derived from the data; ...
Forged command filtering system, collaborative operating system, and related command authentication circuit
Jrsys International Corp.
February 08, 2018 - N°20180041343

A forged command filtering system includes: a secure command generating device for performing a digital signature operation on a selected command to generate a command request; a command transmitting device for receiving and transmitting the command request; a target device; and a command authentication circuit. The command authentication circuit includes: a communication interface for communicating with the command transmitting device ...
Sampler and method of parameterizing of digital circuits and of non-invasive determination of the concentration ...
February 08, 2018 - N°20180037929

A sampler and a method of parameterization by calibration of digital circuits and non-invasive determination of the concentration of several biomarkers simultaneously and in real time. The method makes use of equipment which, from a set of luminous signatures—spectrum—provided by a spectrophotometer (e5) (e6), applies a digital filter that breaks down the spectrum into sub-spectra that ...
Secure product identification and verification
Inexto Sa
February 01, 2018 - N°20180034640

There is provided a method and system for authenticating a production of products. The method and system comprise determining if configuration data for the production run is authorized and, if the production run is authorized, generating a security token and associating the token with configuration data. The configuration data is digitally signed by generating a digital signature and associating the ...
Systems and methods for authenticating and providing anti-counterfeiting features for important documents
Neology, Inc.
February 01, 2018 - N°20180034638

A method for authenticating a document comprises obtaining the contents of a document, obtaining biometric characteristics from an individual, forming a message based on the contents of the document and the biometric characteristics of the individual, generating a digital signature based on the message and a key, and writing the digital signature to an radio frequency identification (rfid) tag affixed ...
Method to prevent cloning of electronic components using public key infrastructure secure hardware device
Stmicroelectronics, Inc.
January 25, 2018 - N°20180026969

An electronic component includes a processor and a memory. The electronic component has a secure platform capable of storing at least one dual key pair and a corresponding digital signature. There is also a system including a host machine and an electronic component capable of being operated by the host machine. The electronic component has a processor, a memory, and ...
Loading