Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided. The method includes receiving a plurality of passphrase elements from an input device. The method also includes performing a sequence of secu
Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided. The method includes receiving a plurality of passphrase elements from an input device. The method also includes performing a sequence of secure delay processing operations, each operation generating a delayed output value from an initial value. The passphrase is verified upon completion of the sequence of secure delay processing operations. Further, initial values of respective secure delay processing operations are based on respective passphrase elements and, for each secure delay processing operation after a first secure delay processing operation, a delayed output value from at least one other secure delay processing operations.
대표청구항▼
1. A method comprising: receiving user authenticating information for applying a digital signature stamp of a user to contents of an electronic video stream;sampling a portion of the electronic video stream;receiving a selection of a region defined by the user, the region overlapping at least some o
1. A method comprising: receiving user authenticating information for applying a digital signature stamp of a user to contents of an electronic video stream;sampling a portion of the electronic video stream;receiving a selection of a region defined by the user, the region overlapping at least some of the electronic video stream, for application of the digital signature stamp;computing, by a computing system comprising computer hardware, a digital signature based on a key and contents of the portion of the electronic video stream; andembedding within the electronic video stream, in association with the portion of the electronic video stream, the digital signature stamp comprising a graphical display of digits corresponding to the computed digital signature. 2. The method of claim 1, wherein the digital signature stamp is of a predetermined size and further comprises a distinctive graphical outline that is of a distinctive color and has a plurality of line segments that lie along opposite sides of the digital signature stamp, thereby allowing the digital signature stamp to be distinguished from the contents of the portion of the electronic video stream. 3. The method of claim 2, wherein the line segments form a continuous border that encloses the graphical display of digits of the digital signature stamp. 4. The method of claim 1, wherein the user authenticating information comprises a passphrase input. 5. The method of claim 1, further comprising removing all graphical information from the selected region prior to computing the digital signature. 6. The method of claim 1, wherein the key comprises a private key associated with the user. 7. The method of claim 1, further comprising truncating a bit size used to represent the contents of the portion of the electronic video stream to generate a truncated representation of the contents of the portion of the electronic video stream, wherein computing the digital signature is based on the truncated representation. 8. The method of claim 1, further comprising identifying a feature vector for the content of the portion of the electronic video stream, wherein computing the digital signature is based on the feature vector. 9. The method of claim 1, wherein the portion of the video stream comprises a frame of the electronic video stream, and wherein the region defined by the user comprises a portion of the frame. 10. The method of claim 1, further comprising: sampling a second portion of the electronic video stream;computing, by the computing system comprising computer hardware, a second digital signature based on the key, the contents of the second portion of the electronic video stream, and the digital signature; andembedding within the electronic video stream, in association with the second portion of the electronic video stream, the second digital signature stamp comprising a graphical display of digits corresponding to the computed digital signature. 11. The method of claim 1, wherein the digital signature stamp is embedded in an out-of-band frequency of the electronic video stream. 12. A secure computing device comprising: a receiver configured to receive user authenticating information for applying a digital signature stamp of a user to contents of an electronic video stream;a memory storing machine readable instructions; anda processor configured to execute the machine readable instructions to cause the secure computing device to: sample a portion of the electronic video stream;receive a selection of a region defined by the user, the region overlapping at least some of the electronic video stream, for application of the digital signature stamp;compute a digital signature based on a key and contents of the portion of the electronic video stream; andembed within the electronic video stream, in association with the portion of the electronic video stream, the digital signature stamp comprising a graphical display of digits corresponding to the computed digital signature. 13. The secure computing device of claim 12, wherein the digital signature stamp is of a predetermined size and further comprises a distinctive graphical outline that is of a distinctive color and has a plurality of line segments that lie along opposite sides of the digital signature stamp, thereby allowing the digital signature stamp to be distinguished from the contents of the portion of the electronic video stream. 14. The secure computing device of claim 13, wherein the line segments form a continuous border that encloses the graphical display of digits of the digital signature stamp. 15. The secure computing device of claim 12, wherein the user authenticating information comprises a passphrase input. 16. The secure computing device of claim 12, wherein the processor is further configured to execute the machine readable instructions to cause the secure computing device to remove all graphical information from the selected region prior to computing the digital signature. 17. The secure computing device of claim 12, wherein the processor is further configured to execute the machine readable instructions to cause the secure computing device to truncate a bit size used to represent the contents of the portion of the electronic video stream, wherein computing the digital signature is based on the truncated representation of the contents of the portion of the electronic video stream. 18. The secure computing device of claim 12, wherein the processor is further configured to execute the machine readable instructions to cause the secure computing device to identify a feature vector for the content of the portion of the electronic video stream, wherein computing the digital signature is based on the feature vector. 19. The secure computing device of claim 12, wherein the processor is further configured to execute the machine readable instructions to cause the secure computing device to: sample a second portion of the electronic video stream;compute a second digital signature based on the key, the contents of the second portion of the electronic video stream, and the digital signature; andembed within the electronic video stream, in association with the second portion of the electronic video stream, the second digital signature stamp comprising a graphical display of digits corresponding to the computed digital signature. 20. A non-transitory computer-readable storage medium including instructions executable by a processor of a secure computing device, the instructions causing the secure computing device to: receive user authenticating information for applying a digital signature stamp of a user to contents of an electronic video stream;sample a portion of the electronic video stream;receive a selection of a region defined by the user, the region overlapping at least some of the electronic video stream, for application of the digital signature stamp;compute a digital signature based on a key and contents of the portion of the electronic video stream; andembed within the electronic video stream, in association with the portion of the electronic video stream, the digital signature stamp comprising a graphical display of digits corresponding to the computed digital signature.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (88)
Epstein, Michael A., Administration and utilization of private keys in a networked environment.
Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302) Graziano James M. (4662 Weld County Rd. 34 Platteville CO 80651), Document authentication apparatus.
Kitaori Shoji,JPX ; Koganezawa Yuichi,JPX, Electronic signature addition method, electronic signature verification method, and system and computer program product.
Zdybel ; Jr. Frank (Palo Alto CA) Sang ; Jr. Henry W. (Cupertino CA) Pedersen Jan O. (Palo Alto CA) Smith ; III Z. E. (Palo Alto CA) Henderson ; Jr. D. A. (Palo Alto CA) Hecht David L. (Palo Alto CA), Hardcopy lossless data storage and communications for electronic document processing systems.
Martino Michael J. (Gardiner NY) Meissner Geoffrey L. (Poughkeepsie NY) Paulsen ; Jr. Robert C. (Highland NY), Identity verification system resistant to compromise by observation of its use.
Graziano James M. (4662 Weld County Road 34 Platteville CO 80651) Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302), Knowledge based system for document authentication (apparatus).
Turnbull James Arthur,CAX ; Curry Ian H.,CAX ; Van Oorschot Paul C.,CAX ; Hillier Stephen William,CAX, Method and apparatus for extending secure communication operations via a shared list.
Abadi Martin ; Needham Roger Michael,GBX ; Lomas Thomas Mark Angus,GBX, Method and apparatus for strengthening passwords for protection of computer systems.
Anderson Milton ; Jaffe Frank ; Hibbert Chris ; Virkki Jyri ; Kravitz Jeffrey ; Chang Sheveling ; Palmer Elaine, Method and system for processing electronic documents.
Horino Naoharu,JPX ; Suto Masayuki,JPX ; Matsui Kineo,JPX, Method of and apparatus for embedding data into an electronic document by modulating spaces between words.
Terao,Taro, One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device.
Pintsov Leon A. (West Hartford CT) Connell Richard A. (South Salem NY) Sansone Ronald P. (Weston CT) Schmidt Alfred C. (Wilton CT), Postal rating system with verifiable integrity.
Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX), Programmable distributed personal security.
Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
Lloyd, Michael; Shepley, Christopher; Stidman, Sean; Browne, H. Lee; Generous, Curtis; Lycas, John, System and method for personalizing electronic mail messages.
Heckman Dean A. (Palmyra NY) Tuttle Steven R. (Rochester NY) Qureshi Irshad H. (Fairport NY), System for electronically printing plural-color tamper-resistant documents.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.