SEARCH
Tynax ~ Patent Library

Patent for Sale:

Data Security Portfolio    

Data security digital signature and authentication

Overview

The patented technologies in this portfolio relate to:

- an authentication exchanging technique that is capable of confirming individual entities processing data and an authentication function, a non-repudiation function for preventing the denial of a data processing action and an integrity of data.

- an identification scheme based on security and a digital signature scheme giving message recovery and with an appendix for authenticating each identity processing information, protecting the integrity of transferred information and preventing fraudulent information processing behavior.

- automatic detection of malicious BOT attacks and the mechanism which can protect the DNS servers and prevent the security accidents by malicious BOT attacks.

- An authentication and key establishment (AKE) protocol, a two-factor authenticated key exchange (TAKE) system in services such as the Internet, wireless LANs, and public access wireless LANs, a security technique for authenticating entity and establishing a key.

The seller may consider selling these patents individually.

Patent Summary

U.S. Patent Classes & Classifications Covered in this listing:

Class 713: Electrical Computers And Digital Processing Systems: Support

Subclass 169: Mutual entity authentication
Subclass 170: Authentication of an entity and a message
Subclass 176: Authentication by digital signature representation or digital watermark
Subclass 180: Generating specific digital signature type (e.g., blind, shared, or undeniable)
Subclass 181: Message digest travels with message

Class 380: Cryptography

Equipment and processes which (a) conceal or obscure intelligible information by transforming such information so as to make the information unintelligible to a casual or unauthorized recipient, or (b) extract intelligible information from such a concealed representation, including breaking of unknown codes and messages.

Subclass 247: CELLULAR TELEPHONE CRYPTOGRAPHIC AUTHENTICATION
Subclass 28: PARTICULAR ALGORITHMIC FUNCTION ENCODING
Subclass 30: Public key

Class 726: Information Security

This class provides, within a computer or digital data processing system, for processes or apparatus for increasing a system s extension of protection of system hardware, software, or data from maliciously caused destruction, unauthorized modification, or unauthorized disclosure. It provides for protection of data processing systems, apparatus, and methods as well as protection of information and services. Subject matter included in this class includes security policies, access control, monitoring, scanning data, countermeasures, usage control, and data protection from maliciously caused destruction, unauthorized modification, or unauthorized disclosure, and includes protection of hardware, and user protection, e.g., privacy, etc.

Subclass 22: MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION
Subclass 23: Intrusion detection
Subclass 24: Virus detection
Subclass 25: Vulnerability assessment

Class 370: Multiplex Communications

This is the generic class for multiplexing or duplexing systems, methods, or apparatus.

Subclass 352: Combined circuit switching and packet switching

Class 709: Electrical Computers And Digital Processing Systems: Multicomputer Data Transferring

This class provides for an electrical computer or digital data processing system or corresponding data processing method including apparatus or steps for transferring data or instruction information between a plurality of computers wherein the computers employ the data or instructions before or after transferring and the employing affects said transfer of data or instruction information. The class includes - process or apparatus for transferring data among a plurality of spatially distributed (i.e., situated, at plural locations) computers or digital data processing systems via one or more communications media (e.g., computer networks).