Patent application number | Description | Published |
20090019501 | CONTENT LICENSING AND CONDITIONAL ACCESS USING A MOBILE DEVICE - Techniques and tools are described which provide control access mechanisms for contents made available by a service provider to a user. The user, after a registration process, uses a mobile application on a mobile device to generate a one-time content key. The content key is input into a set-top box which validates the key and provides access to the protected content. The mobile application allows for password protection for the user, as well as a recharging ability when its one-time content keys are exhausted. | 01-15-2009 |
20110321144 | SYSTEMS AND METHODS OF AUTHENTICATION IN A DISCONNECTED ENVIRONMENT - A communication system and method are disclosed for establishing a secure communication channel including: a server for generating and storing a first instance of a unique personalized client application associated with a first-time user on the server, a client terminal for the user to communicate with the server over a communication channel and a standalone computing device having a second instance of the unique personalized application. The user authenticates the server based on a first dynamic identifier (DI- | 12-29-2011 |
20120254041 | ONE-TIME CREDIT CARD NUMBERS - Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker. | 10-04-2012 |
20130006642 | SYSTEM AND METHOD FOR VOICE BASED DIGITAL SIGNATURE SERVICE - Methods and systems for providing a voice-based digital signature service are disclosed. The method includes a first user sending a document to a second user for signature, and the first user also sending a PIN to the second user and to a voice verification authority. The second user sending, to the voice verification authority, a voice recording comprising the PIN along with consent of the second user to the PIN. The voice verification authority comparing the voice recording with a predefined voice sample of the second user, and the PIN received from the first user with the PIN received from the second user. The voice verification authority then sending a notification to a signing entity based on the comparison. The signing entity signing the PIN of the document with a private key associated with the second user and sends an acknowledgement to the first user and the second user. | 01-03-2013 |
20140026217 | METHODS FOR IDENTIFYING KEY LOGGING ACTIVITIES WITH A PORTABLE DEVICE AND DEVICES THEREOF - A method, non-transitory computer readable medium, and apparatus that establishes a connection with a host computing device. One or more processes running on the host computing device are identified. One or more hooking operations performed in the one or more identified processes are identified. One or more suspected key logging actions are identified from the one or more identified hooking operations based on one or more of a first set of rules and output. | 01-23-2014 |
20140047557 | PROVIDING ACCESS OF DIGITAL CONTENTS TO ONLINE DRM USERS - The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one online Digital Rights Management (DRM) user by a DRM server. This invention involves receiving digital contents from the publishers and those digital contents are encrypted and user rights are granted to access the contents by the publisher. The DRM server stores the decryption information, user rights and user information in a repository. After authenticating the user who is connected with the DRM server through a DRM client, the DRM server sends a license to the DRM user which includes the decryption information and the user rights. The DRM client decrypts the contents based on the license information in the memory of the user's computer device and thus the content and the license are not locally stored. | 02-13-2014 |
20140047558 | SYSTEM AND METHOD FOR PROVIDING ACCESS OF DIGITAL CONTENTS TO OFFLINE DRM USERS - The invention relates to a system and method providing access of one or more heterogeneous digital contents to at least one offline Digital Rights Management (DRM) user by a DRM server. This invention involves establishing the trust relationship among the DRM server, DRM client, user's machine and the end user by means of digital certificate. The server generates protected digital content by means of using a standard encryption algorithm. The invention further involves determining whether a license for accessing the protected file is requested by the legitimate user, and if so, generating a license consisting the user rights and the protected decryption key to be downloaded by legitimate user. The DRM client decrypts the protected file using a decryption key of the license, and renders the content to the end user by calling the appropriate and customized viewer during consumption. | 02-13-2014 |
20150262084 | METHODS FOR DEFENDING STATIC AND DYNAMIC REVERSE ENGINEERING OF SOFTWARE LICENSE CONTROL AND DEVICES THEREOF - The technique relates to a method for defending static and dynamic reverse engineering of software license control and devices thereof. To defend static reverse engineering of software license control the licensed application is wrapped with encryption wrapper, wherein the encryption wrapper encrypts the application with a first password. Then, at the time of executing the application, a password prompt is generated. Upon receiving the first password the application is decrypted. At the time of closing the application after execution, another password prompt is generated to create the second password and then the application is re-encrypted with the second password. To defend dynamic reverse engineering of software license control one or more licensing conditions of the licensed application is tested based on control file information, a random number generation or verification point rules. If any license condition violation is detected during testing then the application gets auto-locked by applying self-encryption technique. | 09-17-2015 |