Patent for Sale:

Data Security Portfolio    

Data security digital signature and authentication

Overview

The patented technologies in this portfolio relate to:

- an authentication exchanging technique that is capable of confirming individual entities processing data and an authentication function, a non-repudiation function for preventing the denial of a data processing action and an integrity of data.

- an identification scheme based on security and a digital signature scheme giving message recovery and with an appendix for authenticating each identity processing information, protecting the integrity of transferred information and preventing fraudulent information processing behavior.

- automatic detection of malicious BOT attacks and the mechanism which can protect the DNS servers and prevent the security accidents by malicious BOT attacks.

- An authentication and key establishment (AKE) protocol, a two-factor authenticated key exchange (TAKE) system in services such as the Internet, wireless LANs, and public access wireless LANs, a security technique for authenticating entity and establishing a key.

The seller may consider selling these patents individually.

Patent Summary

U.S. Patent Classes & Classifications Covered in this listing:

Class 713: Electrical Computers And Digital Processing Systems: Support

This class provides, within a computer or digital data processing system, for the following processes or apparatus for: 1. establishing original operating parameters or data for a computer or digital data processing system, such as, allocating extended or expanded memory, specifying device drivers, paths, files, buffers, disk management, etc.; 2. for changing system settings or operational modes in a computer or digital data processing system after they have been set; 3. for increasing a systemís extension of protection of system hardware,software, or data frm maliciously caused destruction, unauthorized modification, or unauthorized disclosure; 4. for modifying or responding to the available power to a computer or digital data processing system or programmable calculator; 5. for synchronization of two or more processors; 6. wherein a clock or timing signals, timing pulses, or data associated with the control or regulation of any one or combination of processing components, memory components, and peripheral components are caused to operate in synchronization; 7. for generation, division, or distribution of clock signals, pulse signals, or timing signals in a computer or digital data processing system from one or more sources into groups of continuous and successive time increments, and including event timing and counting, and the correction of the clock signals, pulse signals, or timing signals; 8. wherein there is a significant temporal, incremental or sequencing control provided to one or more computers, digital data processing systems, processors, memory, or peripherals, or to data transmission between these systems or components.

Subclass 169: Mutual entity authentication
Subclass 170: Authentication of an entity and a message
Subclass 176: Authentication by digital signature representation or digital watermark
Subclass 180: Generating specific digital signature type (e.g., blind, shared, or undeniable)
Subclass 181: Message digest travels with message

Class 380: Cryptography

Equipment and processes which (a) conceal or obscure intelligible information by transforming such information so as to make the information unintelligible to a casual or unauthorized recipient, or (b) extract intelligible information from such a concealed representation, including breaking of unknown codes and messages.

Subclass 247: CELLULAR TELEPHONE CRYPTOGRAPHIC AUTHENTICATION
Subclass 28: PARTICULAR ALGORITHMIC FUNCTION ENCODING
Subclass 30: Public key

Class 726: Information Security

This class provides, within a computer or digital data processing system, for processes or apparatus for increasing a system s extension of protection of system hardware, software, or data from maliciously caused destruction, unauthorized modification, or unauthorized disclosure. It provides for protection of data processing systems, apparatus, and methods as well as protection of information and services. Subject matter included in this class includes security policies, access control, monitoring, scanning data, countermeasures, usage control, and data protection from maliciously caused destruction, unauthorized modification, or unauthorized disclosure, and includes protection of hardware, and user protection, e.g., privacy, etc.

Subclass 22: MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION
Subclass 23: Intrusion detection
Subclass 24: Virus detection
Subclass 25: Vulnerability assessment

Class 370: Multiplex Communications

This is the generic class for multiplexing or duplexing systems, methods, or apparatus.

Subclass 352: Combined circuit switching and packet switching

Class 709: Electrical Computers And Digital Processing Systems: Multicomputer Data Transferring

This class provides for an electrical computer or digital data processing system or corresponding data processing method including apparatus or steps for transferring data or instruction information between a plurality of computers wherein the computers employ the data or instructions before or after transferring and the employing affects said transfer of data or instruction information. The class includes - process or apparatus for transferring data among a plurality of spatially distributed (i.e., situated, at plural locations) computers or digital data processing systems via one or more communications media (e.g., computer networks).