Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

243results about How to "Verify integrity" patented technology

Securing stored content for trusted hosts and safe computing environments

Techniques for protecting content to ensure its use in a trusted environment are disclosed. The stored content is protected against harmful and/or defective host (or hosted) environments. A trusted security component provided for a device can verify the internal integrity of the stored content and the host before it allows the content to come in contact with the host. As a counter part, a trusted security component provided for the host can verify and attest to the integrity of the host and/or specific host computing environment that can be provided for the content stored in the device. The trusted security component provided for a device effectively verify the host integrity based on the information attested to by the trusted security component provided for the host. If the trusted security component trusts the host, it allows the trusted host to provide a trusted host computing environment trusted to be safe for the content stored in the device. A trusted host can effectively provide a safe virtual environment that allows a content representing a copy (or image) of an original computing environment to operate on the host computing system to give a similar appearance as the original computing environment.
Owner:SAMSUNG ELECTRONICS CO LTD

Diagnostic strategy for a fuel vapor control system

A method for operating a fuel vapor control system included in a vehicle having an internal combustion engine is provided. The method may include storing positive pressure or negative pressure in an isolated fuel tank, transferring at least a portion of the positive pressure or the negative pressure to an evaporation canister region, and determining degradation of the evaporation canister based on a pressure response of the evaporation canister region while the evaporation canister region is isolated from the fuel tank. In this way, it is possible to utilize pressure that may be passively generated in one portion of the system, even during shut-down engine operation, to verify the integrity of another portion of the system.
Owner:FORD GLOBAL TECH LLC

Behavior-based software trusted measurement system and method

InactiveCN102073816AImplement dynamic metricsVerify integrityPlatform integrity maintainanceSoftware trustworthinessSoftware
The invention discloses a behavior-based software trusted measurement system and a behavior-based software trusted measurement method. The system consists of a basic layer, a core layer and a user layer, wherein the trusted measurement of the software is realized by comparing an expected behavior of the software which is extracted in advance before the software is installed with a behavior in actual running of the software. The method solves the problem of trusted measurement when the software runs so as to ensure that 'an expected behavior achieves an expected target'.
Owner:BEIHANG UNIV

Data encryption method, device, data decryption method and device

The invention provides a data encryption method, a data encryption device, a data decryption method and a data decryption device. The data encryption method includes the following steps that: a random number is obtained; a key required by encryption is obtained according to the random number; the key is utilized to encrypt content to be encrypted; and a first abstract is generated by using the encrypted content. With the data encryption method provided by the embodiments of the invention adopted, the corresponding key obtained according to the obtained random number can be selected to encrypt the data content, and an encryption mode can be more flexible with low cost; and information such as the abstract can be added into the data, and therefore, the integrity of the encrypted content can be verified, and therefore, the safety of the encrypted data can be improved.
Owner:PEKING UNIV FOUNDER GRP CO LTD +1

Verification of transactional integrity

Aspects of the present invention provide a solution for verifying the integrity of a transaction. In response to receipt of a confirmed electronic transaction from a user, a one time password is forwarded to the user. The user then initiates a telephonic communication with a verifier on the user's wireless device and provides the one time password to the verifier. The verifier authenticates the mobile telephonic device based on the device's caller identification number and determines whether the one time password provided by the user matches the one forwarded to the user. After the user is authenticated, the verifier communicates the details of the transaction that were received and the user confirms whether the details match those originally entered.
Owner:IBM CORP

Systems and processes of protection and automatic verification of paper documents against falsification, adulteration and leakage

Protection of documents printed in paper is provided by processes for detection, immediately and clearly, of different types of falsification, adulteration, inclusion and omission. A network accessible system is capable of detecting several fraud aspects. A “Remote Expertise Center” or a remote service data center accessible from and to any location in which there is a connection to the network, such as through the Internet provides customized protection and automatic verification of document pages. Documents pages are generated by the Remote Expertise Center and transmitted to remote printers, bypassing user operational system, using a specific driver of each printer, avoiding any access to protected document before effective printing. Documents include multiple types of security features, such that in the event that any of them is surpassed, the document will remain protected by the other types of security protection. Security features may include, among others, background images, computer readable code containing the printed content, identification information readable only with a predetermined optical filter, a copy alert that changes appearance when the printed document is copied, and personalized items to identify individuals responsible for non authorized document disclosure or leakage.
Owner:WANDERLEY LUIZ ALBERTO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products