Class / Patent application number | Description | Number of patent applications / Date published |
713180000 | Generating specific digital signature type (e.g., blind, shared, or undeniable) | 52 |
20080256362 | Method and apparatus for digital signature authentication, and computer product - An apparatus for digital signature authentication includes a dividing unit that divides streaming data into plural pieces of partial data in a predetermined unit; a first creating unit that creates a hash value string including plural hash values corresponding to the pieces of partial data; a second creating unit that creates a first binary tree using the hash value string; and a third creating unit that creates a digital signature of a signer using a root value of the first binary tree. | 10-16-2008 |
20080263360 | Generating and matching hashes of multimedia content - Hashes are short summaries or signatures of data files which can be used to identify the file. Hashing multimedia content (audio, video, images) is difficult because the hash of original content and processed (e.g. compressed) content may differ significantly. The disclosed method generates robust hashes for multimedia content, for example, audio clips. The audio clip is divided ( | 10-23-2008 |
20080276096 | Method and apparatus for protecting external call references - The present invention is generally directed to a method, system, and article of manufacture that ensures the integrity of programs having variable portions. One aspect of this invention is a method for protecting software products having variant portions. This method includes identifying a reference to an external target in a software product, creating an identifier for the external target, and adding the identifier to the reference. In some embodiments, the unique identifier is a digital signature and the reference to an external target is a call to an external library. | 11-06-2008 |
20080282089 | Signature Generation Apparatus and Signature Verification Apparatus - A signature generation apparatus and a signature verification apparatus which can prevent the occurrence of norm zero vector forgery attack. The signature generation apparatus ( | 11-13-2008 |
20080294905 | SECURE APPROACH TO SEND DATA FROM ONE SYSTEM TO ANOTHER - A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR) operation of the original message and a first random message (same size as original message) on a bit by basis to generate a second message. The receiver may also perform an XOR of the second message with a locally generated second random message. The resulting message is sent to the sender system. The sender system may again perform XOR operation of the received message and the first random message, and send the resulting message to receiver. The receiver may perform XOR operation on the received output to generate the original message sent by the sender. Other technologies such as digital signatures and key pairs (public key infrastructure) may be used in each communication between the sender and receiver to further enhance security. | 11-27-2008 |
20080301458 | Power Analysis Attack Countermeasure for the ECDSA - Execution of the Elliptic Curve Digital Signature Algorithm (ECDSA) requires determination of a signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECDSA vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long term cryptographic key. By modifying the sequence of operations involved in the determination of the signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long term cryptographic key. | 12-04-2008 |
20080301459 | Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm - Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key. | 12-04-2008 |
20090024852 | GROUP SIGNATURE SYSTEM, METHOD, DEVICE, AND PROGRAM - A signature device | 01-22-2009 |
20090031137 | BLIND SIGNATURE METHOD AND ITS SYSTEM - Signature requestor terminal device ( | 01-29-2009 |
20090063865 | Configurable Signature for Authenticating Data or Program Code - System and method for authenticating data or program code via a configurable signature. Configuration information is retrieved from a protected first memory, e.g., an on-chip register, where the configuration information specifies a plurality of non-contiguous memory locations that store the signature, e.g., in an on-chip memory trailer. The signature is retrieved from the plurality of non-contiguous memory locations based on the configuration information, where the signature is useable to verify security for a system. The signature corresponds to specified data and/or program code stored in a second memory, e.g., in off-chip ROM. The specified data and/or program code may be copied from the second memory to a third memory, and a signature for the specified data and/or program code calculated based on the configuration information. The calculated signature may be compared with the retrieved signature to verify the specified data and/or program code. | 03-05-2009 |
20090070590 | Digital signature and authentication method and apparatus - A signing technique of a disclosed identification/digital signature method hereof uses a mixing system based on multiplication in a ring and reduction modulo an ideal q in that ring, while a disclosed verification technique uses special properties of products of elements whose validity depends on elementary probability theory. The security of the identification/digital signature scheme comes from the interaction of reduction modulo q and the difficulty of forming products with special properties. In an embodiment of the identification/digital signature scheme hereof that employs a quotient ring of polynomials, the security also relies on the experimentally observed fact that for most lattices, it is very difficult to find a vector whose length is only a little bit longer than the shortest vector, and it is also difficult to find a lattice vector that is quite close to a randomly chosen nonlattice vector. | 03-12-2009 |
20090094460 | Method and system for signer self-managed, encryption-based identification and signature secret management to verify signer and to legitimize basic digital signature without the use of certificates, tokens or PKI (private key infrastructure) - Method and system for signer self-managed, encryption-based identification and signature secret management to verify the signer and to legitimize basic electronic signature without the use of certificates, tokens or PKI while signing electronic document off-line, on-line (corporate network) or on-line using a web based document. When form is completed, the signing procedure is intercepted by the software to check if signer secret and signer information is present on signer device, else the signer can enter required information and additional system information is gathered. The signature information is validated against the stored encrypted signer information. Both the signature ceremony and the encrypted signer secrets and identification information are embedded in the document for delivery to document recipient. The signer's secret is never compromised, as it is at all times created or updated by signer via self-management software and never revealed to an administrator. | 04-09-2009 |
20090119512 | System and method for providing secured electronic transactions - Methods and systems are provided for a secured electronic communication in a network that includes a verification station, a registration station, and a authentication station. At the registration station, a request for a digital certificate is received from a user. The registration station instructs the verification station to forward to the user a message associated with the request. The message is compared against the user at the authentication station to determine whether the message properly identifies the user. A first signal indicating the result of the comparison is sent to the verification station. If the first signal indicates that the message properly identifies the user, a second signal is sent to the registration station. Based on the second signal, the registration system then generates a digital certificate. | 05-07-2009 |
20090164793 | DIGITAL SIGNATURE SYSTEM AND DIGITAL SIGNING METHOD - A digital signature program includes computer-executable instructions for giving a numerical value in a state where header information necessary for playback of each partial data item may be added to the partial data item resulting from the division to a one-way function to generate an output value sequence of the one-way function concerning the multiple partial data items. The program also includes computer-executable instructions for generating binary trees concerning the streaming data, having leaves including only the output values in the output value sequence; and computer-executable instructions for using an output value indicating a root of the generated binary trees to generate a digital signature of a signer for the streaming data. | 06-25-2009 |
20090210720 | METHOD FOR GENERATING ONE-TIME PASSWORD - A method for generating a one-time password (OTP) by using software only is provided. The method is suitable for generating a common dynamic password in a first electronic device and a second electronic device. First, an initial number is provided to the first electronic device and the second electronic devices. Then, a value is generated, encrypted into a transmission value according to the initial number, and transmitted to the second electronic device by the first electronic device. Next, the transmission value is decrypted by the second electronic device according to the initial number to obtain the value. Finally, a dynamic password is respectively generated in the first electronic device and the second electronic device according to the initial number and the value. Thereby, an OTP system is constituted. | 08-20-2009 |
20090327735 | UNIDIRECTIONAL MULTI-USE PROXY RE-SIGNATURE PROCESS - A “proxy re-signature system” provides various techniques for transforming a delegatee's signature on a message m into a delegator's on the same message m. Various embodiments of non-interactive re-signature generation processes are described. Various embodiments to aggregate part of signatures to reduce the size of re-signed signatures are also described. Various combinations of the proxy re-signature process and the re-signature conversion process result in an overall process that is unidirectional, multi-use, private, and non-interactive. As such, the proxy re-signature system is applicable for use with a wide range of applications. | 12-31-2009 |
20100023777 | SYSTEM AND METHOD FOR SECURE FIRMWARE UPDATE OF A SECURE TOKEN HAVING A FLASH MEMORY CONTROLLER AND A SMART CARD - A system and method of operating a device to securely update the control firmware controlling the device. Downloading a firmware update package to a first microcontroller of the device. Determining a firmware update portion and an encrypted hash portion of the firmware update package wherein the encrypted hash portion is cryptographically signed by a signatory. Confirm that the encrypted hash portion conforms to the firmware update by independently computing the hash of the encrypted firmware update portion on the first microcontroller and comparing that value to the signed hash. Other systems and methods are disclosed. | 01-28-2010 |
20100042845 | IC TAG SYSTEM - An IC tag system is provided which can perform transfer of a method of accessing an IC tag and assure data validity of the IC tag only between authorized users. The IC tag system comprises a data write-in device including a password encryption unit ( | 02-18-2010 |
20100049985 | DISTRIBUTED FREQUENCY DATA COLLECTION VIA DNS NETWORKING - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 02-25-2010 |
20100077222 | METHOD FOR PRODUCING ACKNOWLEDGED TRANSACTION DATA AND CORRESPONDING DEVICE - A method and a display preparation unit are proposed for the execution of a transaction during which transaction data are processed which have to be confirmed by a user. The display preparation unit ( | 03-25-2010 |
20100082997 | SECURE DATA UTILIZATION - A system, comprising an external memory operative to store data therein, the data including a plurality of sections, each of the sections being associated with a signature, and an internal memory operationally connected to the external memory, and a processor arrangement operationally connected to the internal memory, the processor arrangement including a transfer module to transfer one section from the external to the internal memory, an authentication module to authenticate the signature of the section transferred from the external memory, a validity status module to identify the section as valid if the signature is authentic, and an execution module to utilize the section of the data only if the section is valid, wherein the validity status module is operative to invalidate the section, if the content of the section is changed while stored in the internal memory. Related apparatus and methods are also described. | 04-01-2010 |
20100122093 | METHOD, APPARATUS AND SYSTEM FOR VERIFYING AUTHENTICITY OF AN OBJECT - The invention relates to a method for proving authenticity of a prover PRV to a verifier VER, the method comprising generating a secret S using a physical token by the prover PRV. Obtaining a public value PV by the verifier, where the public value PV has been derived from the secret S using a function for which the inverse of said function is computationally expensive. The method further comprising a step for conducting a zero knowledge protocol between the prover PRV and the verifier VER in order to prove to the verifier VER, with a pre-determined probability, that the prover PRV has access to the physical token, where the prover PRV makes use of the secret S and the verifier VER makes use of the public value PV. The invention further relates to a system employing the method, and an object for proving authenticity. | 05-13-2010 |
20100146289 | RADIO SCENE ENCRYPTION AND AUTHENTICATION PROCESS - A method is provided for encryption/decryption for secure the privacy of the information flow between two communicating nodes, and authentication to establish the identity of the communicating nodes in digital communications systems. A common secret or encryption key is generated at the two nodal ends of the communication link without prior dissemination. The authenticity of the communicating entities are maintained over time based on unique non-idealities of the communicating nodes in conjunction with the propagation characteristics of a link between them. | 06-10-2010 |
20100169656 | GROUP SIGNATURE SYSTEM, DEVICE, AND PROGRAM - A group signature system includes a group manager device, a signer device and a verifier device capable of communicating with each other, each device using a group signature scheme. The group manager device generates a group secret key, a group public key, a member secret key and a signer tracing information. The signer device generates an encrypted text data of the signer tracing information, and a zero-knowledge proof showing that the signer device knows the member secret key and the encrypted text data is correctly generated based on the signer tracing information. The signer device transmits, to the verifier device, a group signature composed of the encrypted text data and the zero knowledge proof, and the message. The verifier device verifies correctness of the group signature and transmits the verified result to the signer device. | 07-01-2010 |
20100223473 | SYSTEMS AND METHODS FOR NETWORK MANAGEMENT USING SECURE MESH COMMAND AND CONTROL FRAMEWORK - Embodiments relate to systems and methods for network management using a secure mesh command and control framework. A network management server can communicate with a set of supervisory hosts, which in turn communicate with an underlying set of targets. The set of targets can have associated digital certificates which can be authenticated by common certificate authorities. A controlled target can authenticate one or more other target requesting access to the controlled target via the trusted common certificate authority. One authenticated target can therefore mesh on a trusted basis with another target to perform installation, monitoring, testing, or other activities directly on the target of interest, without channeling commands through an intervening supervisory host. | 09-02-2010 |
20100250953 | System And Method For Generating A Signature - The present invention provides a system and a method for generating digital signatures. The system comprises a first formula which generates the signature as selected series from at least two, but preferably more digitized biometric features of a user. The signature comprises a different selected series per unit of time of for instance 10 seconds. The invention comprises a second formula which assigns a numerical value to a data file. The second formula can also use the numerical value to define another time interval, on the basis of which another signature can be generated. The invention further provides a number of examples for application of the generated signature during the sending of data files. | 09-30-2010 |
20100262833 | ACTIVATING STREAMING VIDEO IN A BLU-RAY DISC PLAYER - Techniques are described herein for using cryptographic elements of the Advanced Access Content System (AACS) in a client-server environment to cryptographically authenticate client applications that are executing on non-revoked AACS-compliant playback devices. The techniques described herein may be used to protect a server application from providing information to client applications executing in non-AACS-compliant or revoked environments. In one embodiment, the techniques are used to authenticate a Blu-ray Disc Java Application executing on a non-revoked AACS-compliant Blu-ray Disc Player. | 10-14-2010 |
20100281267 | Image Processing Apparatus, Electronic Signature Generation System, Electronic Signature Key Generation Method, Image Processing Method, and Program - An image processing apparatus includes a first partial information providing unit that provides first partial information to another device holding a first signing key KS corresponding to a first verification key KV, the first partial information constituting a part of a second verification key KV′ (KV′≠KV) that is capable of verifying an electronic signature σ generated using the first signing key KS and being unable to identify the second verification key KV′; a second partial information acquisition unit that acquires second partial information which is generated by the another device using the first partial information and the first signing key KS, and which is unable to identify the first signing key KS and used for generating the remaining part of the second verification key KV′; and a second verification key generation unit that generates the second verification key KV′ based on the first and second partial information. | 11-04-2010 |
20110010557 | CONTROL MESSAGE SIGNATURE FOR DEVICE CONTROL - A method of controlling a peripheral device includes generating, in a host processor, a control message for transmission to the peripheral device, and calculating a signature for the control message. The control message and the signature are written to an address in a system memory of the host processor, and the peripheral device is notified of the address, so as to cause the device to read the control message and the signature from the system memory. | 01-13-2011 |
20110055580 | NONCE GENERATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating a nonce. In one aspect, a method includes generating, by a data processing apparatus, a source value, and hashing, by the data processing apparatus, the source value to generate the nonce. | 03-03-2011 |
20110078454 | ENCRYPTED COMMUNICATION DEVICE WITH RESTRICTED RATE OF ENCRYPTION KEY RETRIEVALS FROM MEMORY - A device for encrypted communication with external entities is configured to frustrate side channel attacks attempting to determine an encryption key. The device has a first memory, an encryption key stored in the first memory and a one-way function for application to the encryption key. During use the encryption key is retrieved from the first memory prior to application to the one-way function and the device is configured to limit the number of times the encryption key is allowed to be retrieved from the first memory in a given period of time. | 03-31-2011 |
20110083016 | Secure User Authentication Using Biometric Information - An apparatus includes a biometric sensor capable of identifying biometric information associated with a user. A storage device coupled to the biometric sensor stores user information. A biometric service is coupled to the biometric sensor and capable of communicating with the biometric sensor. A web browser application having a biometric extension communicates with the biometric sensor via the biometric service. The web browser's biometric extension is capable of communicating with multiple web servers. | 04-07-2011 |
20110093718 | HYBRID SIGNATURE SCHEME - A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as input to the verification algorithm. A first signature component is generated by encrypting the first portion alone. An intermediate component is formed by combining the first component and the visible portion and cryptographically hashing them. A second signature component is then formed using the intermediate component and the signature comprises the first and second components with the visible portion. A verification of the signature combines a first component derived only from the hidden portion of the message with the visible portion and produces a hash of the combination. The computed hash is used together with publicly available information to generate a bit string corresponding to the hidden portion. If the required redundancy is present the signature is accepted and the message reconstructed from the recovered bit string and the visible portion. | 04-21-2011 |
20110126022 | METHOD FOR GENERATING AN ADVANCED ELECTRONIC SIGNATURE FOR AN ELECTRONIC DOCUMENT - A process for the generation of an advanced electronic signature of an electronic document ( | 05-26-2011 |
20110173453 | Capability and Behavior Signatures - Techniques for capability and behavior signatures are described. In one or more embodiments, various data describing the capabilities and behaviors of a client is collected. The collected data is analyzed to generate a signature that is indicative of whether the client is operated by a human or a non-human. Selective access to resources is provided to the client based at least in part on the signature that is generated. | 07-14-2011 |
20110246781 | CLIENT TERMINAL, SERVER, SERVER-CLIENT SYSTEM, COOPERATION PROCESSING METHOD, PROGRAM AND RECORDING MEDIUM - An application on a client terminal transmits application session information indicating a state of the application itself and an application signature proving the identity of the application to a browser. The browser transmits the application session information and the application signature to a server. The server generates an HTML page in which a script specifying an operation to be performed by the application is inserted and server session information and transmits the HTML page and the server session information to the browser along with the application signature received from the browser. When the script is activated, the browser passes the information received from the server to the application. The application performs processing according to the server session information only if the application signature passed from the browser is an application signature generated by the application itself. | 10-06-2011 |
20110296192 | INFORMATION PROCESSING DEVICE, PROGRAM DEVELOPING DEVICE, PROGRAM VERIFYING METHOD, AND PROGRAM PRODUCT - According to one embodiment, an information processing device stores a program list and plural types of security functions each defining therein protection attributes for respective arguments related to input and output of data to be protected, and stores function argument protection attributes and dependency relations each of which is defined by a determinant set and a dependent attribute that satisfy a predetermined condition. The device detects a combination of first and second security functions in which integrity of variables included in a determinant set of one dependency relation in the first security function are verified by the second security function, generates a third security function which adds protection attributes that guarantee integrity to variables included in the dependent attribute of the dependency relation in the first security function when verification of the second security function is successful and which outputs the variables, and updates the function argument protection attribute and the dependency relation concomitantly with an addition of the third security function. | 12-01-2011 |
20110302420 | SYSTEM AND METHOD FOR AUTHENTICATED AND PRIVACY PRESERVING BIOMETRIC IDENTIFICATION SYSTEMS - A biometric based identification and authorization for a collected physical biometric for a security infrastructure is presented. The biometric identification and authorization is achieved with an identity verification template (IVT) generated from a User Biometric (UB) collected from a human or non-human object and stored on an biometric storage device (e.g., a magnetic strip card, smart card, Universal Serial Bus (USB) flash drive or a Radio Frequency Identifier (RFID) device, etc.). The generated UB is discarded. The IVT does not contain complete information from the UB but allows for accurate verification of the human or non-human object when another UB is generated for the human or non-human object at a later time. | 12-08-2011 |
20110302421 | Authentication Method And Apparatus Using One Time Pads - An authentication method is provided between entities ( | 12-08-2011 |
20120072733 | WEARABLE TIME-BRACKETED VIDEO AUTHENTICATION - A wearable video recording system with time-bracketed authentication is provided and includes a article, including a spine, wearable by a user, a recording device, supported on the spine, to generate a recording of a scene, an affecter subsystem, supported on the spine, to influence the scene being recorded with unpredictable data and an untrusted controller coupled to the recording device and the affecter subsystem, the untrusted controller being receptive of the unpredictable data, which the untrusted controller communicates to the affecter subsystem, and being configured to transmit at least hashed digests of the recording to one or more repositories. | 03-22-2012 |
20120089846 | METHOD AND ARRANGEMENT FOR SENDING AND RECEIVING CONFIDENTIAL ELECTRONIC MESSAGES IN A LEGALLY BINDING MANNER - In a method and arrangement for the secure transmission of at least one electronic message from a first terminal of a first user to at least one second terminal of a second user, the electronic message is generated by the first terminal. The electronic message is received by the second terminal. The electronic message is transmitted by an infrastructure for legally binding transmission of electronic messages from the first terminal to the second terminal. A first security module connected to the first terminal encrypts and/or signs the electronic message before the electronic message is transmitted by the infrastructure from the first terminal to the second terminal. A second security module, connected to the second terminal, decrypts the transmitted electronic message and/or verifies the signed electronic message. | 04-12-2012 |
20120137136 | GROUP SIGNATURE SCHEME - An efficient and safe group signature scheme is provided. According to the present invention, an open unit is provided to not an issuer but an opener, and a data required for operating the open unit does not include a key pair of the issuer, so that it is possible to accurately operate the open unit even if the issuer generates the public key in an illegal manner. In addition, it is possible to prove that a key pair of a member cannot be counterfeited. It is possible to implement from a discrete logarithm assumption a feature that a cipher text, that is, a portion of a signature text can be decrypted only by the opener in a method which IS the same as a method representing that an ElGamal crypto scheme is safe. | 05-31-2012 |
20120166808 | LATTICE-BASED RING SIGNATURE METHOD - A lattice-based ring signature method includes generating a dimension, a bound, a length of a hashed message, a Gaussian parameter and an open parameter, which are parameters necessary for a ring signature. Further, the lattice-based ring signature method includes generating a signature key and a verifying key for a user who construct a ring by using the parameter necessary for the ring signature. Furthermore, the lattice-based ring signature method generating a signature for a message and the ring by using the signature key and the verifying key. | 06-28-2012 |
20120254620 | Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm - Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key. | 10-04-2012 |
20130138967 | Method and System for Replaying a Voice Message and Displaying a Signed Digital Photograph Contemporaneously - Systems and methods for generating authentic digital memorabilia are described. A signor may be provided a digital photograph. The signor's signature, written message, or voice message may be received. Biometric authentication or verification may be performed on the signor's handwriting or voice sample through comparison with stored samples. If the verification signifies a high likelihood signor's handwriting or voice sample is authentic, creation of digital memorabilia is performed by embedding signor's signature or written message in a digital photograph and linking the signor's voice message with the photograph. The digital memorabilia is accompanied by a certificate of authenticity and distributed to a customer or displayed on a website. | 05-30-2013 |
20130185566 | SYSTEM AND METHOD FOR SECURING DATA WHILE MINIMIZING BANDWIDTH - Systems and methods for securing data are disclosed. A method for securing data can comprise processing a data block to generate a signature, processing the signature to generate a reduced signature, transmitting the data block to a recipient, and transmitting the reduced signature to the recipient. | 07-18-2013 |
20140040625 | Prevention of Playback Attacks Using OTP Memory - A method for data security includes receiving, in a processor having a one-time programmable (OTP) memory, which includes multiple bits and has a current state defined by the bits of the OTP that have been programmed, new information to be written to a data memory. Based on the new information and the current state, at least one further bit of the OTP memory is selected to be programmed, thereby defining a new state of the OTP memory. A new digital signature is computed over the new information and the new state. The new information and the new digital signature are saved in the data memory. After saving the new information and the new digital signature in the data memory, the at least one further bit of the OTP memory is programmed, whereby the new state becomes the current state. Related apparatus and methods are also disclosed. | 02-06-2014 |
20140201535 | INCORPORATING DATA INTO AN ECDSA SIGNATURE COMPONENT - During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature component. The particular information may be related to one or more of the signer and the message to be signed. After receiving a signed message purported to be signed by the signer, a verifier can extract the particular information from the signature component. | 07-17-2014 |
20150052364 | Increasing Security in Inter-Chip Communication - An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the sending control module and the receiving control module. The sending control module operates to send data on the communication bus, disable the communication bus when threats are detected, or both. | 02-19-2015 |
20160013946 | GROUP SIGNATURE USING A PSEUDONYM | 01-14-2016 |
20160173284 | AUTHENTICATING A CONSUMABLE PRODUCT BASED ON A REMAINING LIFE VALUE | 06-16-2016 |
20180026798 | METHOD FOR THE GENERATION OF A DIGITAL SIGNATURE OF A MESSAGE, CORRESPONDING GENERATION UNIT, ELECTRONIC APPARATUS AND COMPUTER PROGRAM PRODUCT | 01-25-2018 |