Patent for Sale:Data Security Portfolio
- an authentication exchanging technique that is capable of confirming individual entities processing data and an authentication function, a non-repudiation function for preventing the denial of a data processing action and an integrity of data.
- an identification scheme based on security and a digital signature scheme giving message recovery and with an appendix for authenticating each identity processing information, protecting the integrity of transferred information and preventing fraudulent information processing behavior.
- automatic detection of malicious BOT attacks and the mechanism which can protect the DNS servers and prevent the security accidents by malicious BOT attacks.
- An authentication and key establishment (AKE) protocol, a two-factor authenticated key exchange (TAKE) system in services such as the Internet, wireless LANs, and public access wireless LANs, a security technique for authenticating entity and establishing a key.
The seller may consider selling these patents individually.
Class 713: Electrical Computers And Digital Processing Systems: SupportSubclass 169: Mutual entity authentication
Subclass 170: Authentication of an entity and a message
Subclass 176: Authentication by digital signature representation or digital watermark
Subclass 180: Generating specific digital signature type (e.g., blind, shared, or undeniable)
Subclass 181: Message digest travels with message
Class 380: Cryptography
Equipment and processes which (a) conceal or obscure intelligible information by transforming such information so as to make the information unintelligible to a casual or unauthorized recipient, or (b) extract intelligible information from such a concealed representation, including breaking of unknown codes and messages.Subclass 247: CELLULAR TELEPHONE CRYPTOGRAPHIC AUTHENTICATION
Subclass 28: PARTICULAR ALGORITHMIC FUNCTION ENCODING
Subclass 30: Public key
Class 726: Information Security
This class provides, within a computer or digital data processing system, for processes or apparatus for increasing a system s extension of protection of system hardware, software, or data from maliciously caused destruction, unauthorized modification, or unauthorized disclosure. It provides for protection of data processing systems, apparatus, and methods as well as protection of information and services. Subject matter included in this class includes security policies, access control, monitoring, scanning data, countermeasures, usage control, and data protection from maliciously caused destruction, unauthorized modification, or unauthorized disclosure, and includes protection of hardware, and user protection, e.g., privacy, etc.Subclass 22: MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION
Subclass 23: Intrusion detection
Subclass 24: Virus detection
Subclass 25: Vulnerability assessment
Class 370: Multiplex Communications
This is the generic class for multiplexing or duplexing systems, methods, or apparatus.Subclass 352: Combined circuit switching and packet switching
Class 709: Electrical Computers And Digital Processing Systems: Multicomputer Data Transferring
This class provides for an electrical computer or digital data processing system or corresponding data processing method including apparatus or steps for transferring data or instruction information between a plurality of computers wherein the computers employ the data or instructions before or after transferring and the employing affects said transfer of data or instruction information. The class includes - process or apparatus for transferring data among a plurality of spatially distributed (i.e., situated, at plural locations) computers or digital data processing systems via one or more communications media (e.g., computer networks).