Patent application number | Description | Published |
20090063986 | SYSTEM AND METHOD FOR VERIFYING AN ELECTRONIC DOCUMENT - A system for verifying an electronic document, including a first device comprising a first display, a first interface and a first displaying program for displaying the electronic document on the first display, a second device comprising a second display, a second interface and a second displaying program, a communication channel between the first interface and the second interface, wherein the first and the second device are operable to exchange the electronic document and wherein the system comprises a selection function, the selection function for selecting a part of the electronic document and generating position information of the selected part of the electronic document, and wherein the second displaying program is operable to lock the electronic document after the exchange with the first device and display the selected part of the electronic document on the second display. | 03-05-2009 |
20090271618 | ATTESTATION OF COMPUTING PLATFORMS - A method and apparatus for attesting the configuration of a computing platform to a verifier. A signature key (SK) is bound to the platform and bound to a defined configuration of the platform. A credential (C(SK), C | 10-29-2009 |
20090300347 | SET MEMBERSHIP PROOFS IN DATA PROCESSING SYSTEMS - A method and apparatus for proving and a method and apparatus for verifying that a secret value is a member of a predetermined set of values. The proving mechanism receives a set of signatures which has respective values in the predetermined set signed using a private key. The proving mechanism sends to the verifying mechanism a commitment on the secret value of the proving mechanism. The proving mechanism and verifying mechanism then communicate to implement a proof of knowledge protocol demonstrating knowledge by the proving mechanism of a signature on the secret value committed to in the commitment, thus proving that the secret value is a member of the predetermined set. | 12-03-2009 |
20090313172 | METHOD AND SYSTEM FOR LINKING AN ANONYMOUS ELECTRONIC TRADE ORDER TO AN IDENTITY OF A TRADER - A method for automatically linking an anonymous electronic trade order having an order quantity (q) to an identity of a trader by providing an identity marker (s) of the trader; embedding the identity marker (s) by splitting the anonymous trade order into a number (n) of trade orders each having a corresponding order quantity x (i) to generate a trade order set; and placing the generated trade order set in an electronic order book. | 12-17-2009 |
20100063932 | Forming Credentials - Techniques are disclosed for issuing inoperative credentials, and making the inoperative credential operative at a subsequent point in time. For example, an inoperative credential is made valid when a triggering event occurs qualifying or entitling the inoperative credential holder to the operative credential. Using methods and apparatus of the invention enables issuing inoperative credentials, as well as any operative credential, at the time that an electronic identity card is issued. Operative and inoperative credentials are issued only once. Therefore, electronic identity cards do not need to be reissued at a later time to add, remove or change credentials, thus eliminating costs associated with electronic identity card reissue. An embodiment of the invention is a method of forming a credential. The method comprises the step of forming, at a first point in time, an inoperative credential. The inoperative credential is adapted to become operative, at a second point in time, to form an operative credential. The second point in time occurs after the first point in time. | 03-11-2010 |
20100142704 | CRYPTOGRAPHIC ENCODING AND DECODING OF SECRET DATA - Methods and apparatus are provided for cryptographically encoding secret data in a data processing system. The secret data is encoded in accordance with a verifiable encryption process to produce a cryptographic construction (θ) having a decryption constraint dependent on the occurrence of a predetermined event. An event-dependent decryption constraint is thereby built into the cryptography, so that there is an intrinsic restriction on the ability to decrypt the encoded secret data which is dependent on occurrence of the predetermined event. Decoding apparatus for such a cryptographic construction is also provided, as well as distributed trust data processing systems providing accountable privacy based on use of such cryptographic constructions. | 06-10-2010 |
20110029885 | Confidential Presentations in Virtual Worlds - Methods and apparatus for presenting confidential presentations are presented. For example, a method for providing a confidential presentation includes providing a data stream by a stream server of a provider of the confidential presentation to a participant client, providing virtual world elements from a virtual world provider to the participant client, and forming, by the participant client, virtual world display data comprising the data stream and the virtual world elements. The virtual world provider is distinct from the provider of the confidential presentation. | 02-03-2011 |
20120063593 | OBLIVIOUS TRANSFER WITH HIDDEN ACCESS CONTROL LISTS - A method, apparatus, and a computer readable storage medium having computer readable instructions to carry out the steps of the method for anonymous access to a database. Each record of the database has different access control permissions (e.g. attributes, roles, or rights). The method allows users to access the database record while the database does not learn who queries a record. The database does not know which record is being queried: (i) the access control list of that record or (ii) whether a user's attempt to access a record had been successful. The user can only obtain a single record per query and only those records for which he has the correct permissions. The user does not learn any other information about the database structure and the access control lists other than whether he was granted access to the queried record, and if so, the content of the record. | 03-15-2012 |
20140059345 | OBLIVIOUS TRANSFER WITH HIDDEN ACCESS CONTROL LISTS - A method, apparatus, and a computer readable storage medium having computer readable instructions to carry out the steps of the method for anonymous access to a database. Each record of the database has different access control permissions (e.g. attributes, roles, or rights). The method allows users to access the database record while the database does not learn who queries a record. The database does not know which record is being queried: (i) the access control list of that record or (ii) whether a user's attempt to access a record had been successful. The user can only obtain a single record per query and only those records for which he has the correct permissions. The user does not learn any other information about the database structure and the access control lists other than whether he was granted access to the queried record, and if so, the content of the record. | 02-27-2014 |