Match Document Document Title
US20120237030 ELLIPTIC CURVE-BASED MESSAGE AUTHENTICATION CODE SYSTEM AND METHOD  
The elliptic curve-based message authentication code is a computational method for improving the security of existing message authentication code (MAC) generating methods through the use of...
US20110058672 MESSAGE DECIPHERING METHOD, SYSTEM AND ARTICLE  
A method for decrypting the encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device (ME). In one...
US20120281829 REMOTE DIGITAL FIRING SYSTEM  
A remote digital firing system for selectively firing a plurality of remote mission payloads. The remote digital firing system includes a first set of firing circuits communicatively coupled to...
US20120314862 SYSTEM AND METHOD FOR AN ATM ELECTRONIC LOCK SYSTEM  
A method for ATM Electronic Lock System comprising the steps: (a) a user using ATM card and entering PIN in an ATM Electronic Lock Subsystem, (b) the ATM Lock System authenticating the user, (c)...
US20130236012 Public Key Cryptographic Methods and Systems  
Methods and systems are disclosed for improving public key cryptography schemes, such as RSA and its variants, to allow for decryption of messages using less than all of the prime factors of the...
US20130044876 GENOMICS-BASED KEYED HASH MESSAGE AUTHENTICATION CODE PROTOCOL  
Apparatuses, systems, computer programs and methods for implementing a genomics-based security solution are discussed herein. The genomics-based security solution may include reading and parsing a...
US20130148806 System and Method for Second Factor Authentication  
As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and...
US20090154699 NETWORK-BASED DATA EXCHANGE  
A method associated with the exchange of information over a network may include receiving a request for information from a first entity, identifying a second entity based on the request and...
US20150154826 Creation And Monitoring Of "Fair Play" Online Gaming  
A “fair play” online gaming system comprises a deal server for generating an encrypted set of gaming elements (such as cards) and a play server for controlling a set of operations within a game....
US20120201378 EFFICIENT, REMOTE, PRIVATE TREE-BASED CLASSIFICATION USING CRYPTOGRAPHIC TECHNIQUES  
A method and apparatus are disclosed herein for classification. In one embodiment, the method comprises performing tree-based classification of a user input by a classifier with a classification...
US20130208887 COMMUNICATION SYSTEM  
A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function...
US20120008779 METHOD FOR SECURE TRANSFER OF MESSAGES  
The present invention may be deployed in a system for broadcast of conditional access content where it is desirable to detect and take action against receiver equipment which has been used in a...
US20100106519 LOW COST SYSTEM FOR REMOTE PATIENT AUDIO/VIDEO CONTENT DELIVERY  
When providing a cost-efficient remote patient monitoring and/or education system, a home-end device (HED) (12) is coupled to a central server (14) using a communication link over PSTN line or the...
US20130343540 CIPHERING AS A PART OF THE MULTICAST CONCEPT  
The invention proposes a method for transmitting a message to a plurality of user entities in a network by using a multicast service, comprising the steps of encrypting a multicast message by...
US20120070000 Securing Two-Party Computation Against Malicious Adversaries  
Methods and apparatus are provided for securing two-party computations against malicious adversaries. A method is provided for secure function evaluation. The disclosed method is performed by a...
US20100322421 METHOD FOR MAKING SECURE AN ELECTRONIC ENTITY WITH ENCRYPTED ACCESS  
A method for protecting an electronic entity with encrypted access, against DFA (Differential Fault Analysis) attacks which includes: storing the result of a selected step (Rm, Kn) of an iterative...
US20130022200 Broadcast Encryption Based Security System  
Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates...
US20150036820 Probability Durable Entropic Advantage  
A method used by two strangers subject to comprehensive eavesdropping, and in need for establishing privacy and secrecy, or more generally, an entropic advantage. Unlike the prevailing one-way...
US20100322422 METHOD FOR ELLIPTIC CURVE SCALAR MULTIPLICATION USING PARAMETERIZED PROJECTIVE COORDINATES  
The method for elliptic curve scalar multiplication in an elliptic curve cryptosystem implemented over an insecure communications channel includes the steps of: (a) selecting positive integers Lx...
US20110317834 SYSTEM AND METHOD FOR SECURE MESSAGING IN A HYBRID PEER-TO-PEER NETWORK  
An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables endpoints to securely send and receive messages to one another within a hybrid...
US20110066909 PLUGGABLE TRANSCEIVER MODULE WITH ENHANCED CIRCUITRY  
Pluggable transceiver modules with additional functions and circuitry contained within the module. In a first embodiment, additional circuitry is added to determine bit error rates at the point of...
US20090241177 SECURITY SYSTEM FOR A COMMUNITY BASED MANAGED HEALTH KIOSK SYSTEM  
The present invention is directed to security systems for community based managed health kiosk systems, and more particularly to protecting the privacy of a user's health information originally...
US20120093311 EFFICIENT PROCEDURE FOR PAIRING MEDICAL DEVICES FOR WIRELESS COMMUNICATION WITH LIMITED USER INTERACTION  
A method for pairing a handheld diabetes managing device with an insulin pump for secure wireless communication with limited user interaction. A pump identification code that uniquely identifies...
US20120263300 TAG GENERATION METHOD IN BROADCAST ENCRYPTION SYSTEM  
A tag generation method for generating tags used in data packets in a broadcast encryption system is provided. The method includes detecting at least one revoked leaf node; setting a node...
US20110235804 TECHNIQUES FOR WATERMARKING AND DISTRIBUTING CONTENT  
Techniques for watermarking and distributing are provided. Content is broken into frames, each frame includes a watermark. Resources request the content and each frame of each resource's acquired...
US20120263298 METHOD AND SYSTEM FOR SUPPORTING SECURITY IN A MOBILE COMMUNICATION SYSTEM  
The present invention relates to a mobile communication system, and more particularly, to a method and system for efficiently supporting security in a mobile communication system. The method for...
US20110173446 System and Method for Securing Wireless Transmissions  
A system and method for securing wireless transmissions is provided. A method for transmitting secure messages includes selecting a bin of codewords from a plurality of bins. The bin of codewords...
US20110316668 Method and Apparatus to Facilitate Message Transmission and Reception Via Wireline Using Different Transmission Characteristics  
Upon providing (101) message content (such as a wireline remote control instruction) to be transmitted via wireline, and in conjunction with provision (102) of a plurality of different wireline...
US20120045057 CHALLENGE RESPONSE-BASED DEVICE AUTHENTICATION SYSTEM AND METHOD  
A challenge response scheme authenticates a requesting device by an authenticating device. The authenticating device generates and issues a challenge to the requesting device. The requesting...
US20130114812 DEMAND BASED ENCRYPTION AND KEY GENERATION AND DISTRIBUTION SYSTEMS AND METHODS  
Systems and methods providing a key management platform that generates and distributes demand-based encryption and decryption keys are described.
US20140226816 A METHOD FOR ATTRIBUTE BASED BROADCAST ENCRYPTION WITH PERMANENT REVOCATION  
The invention is a method for broadcast encryption that allows a broadcaster to send encrypted data to a set of users such that only a subset of authorized users can decrypt said data. The method...
US20120308005 Media Storage and Playback of Encrypted Content  
A content distribution system is disclosed that supports verification of transmission. In some embodiments, a remote probe device captures content and sends the content to a decrypting device so...
US20130251147 Lexicon Cryptogram Generation System For Electronic Messaging  
A system and method for automatically creating lexicon word cryptograms from encrypted message information for securely transporting a message via electronic mail, electronic phone messaging, and...
US20130336483 METHOD AND SYSTEM FOR SECURITY ENHANCEMENT FOR MOBILE COMMUNICATIONS  
A method and system for enhanced security for A5/1 encoding, the method including choosing, at a transmitter, bits within a layer 1 header of a slow associated control channel (‘SACCH’) message...
US20130089203 Content Consumption Frustration  
A device including a receiver to receive a media stream including media content for a plurality of services, the content packed into packets each having a header and payload including a part of...
US20150163052 POWERLINE COMMUNICATION NETWORK ANALYZER  
A powerline communication (PLC) network analyzer can join a PLC network by authenticating and associating with a central coordinator of the PLC network. The network analyzer can receive an...
US20120082310 CONTENT PROTECTION USING BLOCK REORDERING  
An apparatus and method for protecting a content item such as a digitally encoded movie, an electronic programming guide, or the like, by reordering blocks of the content item prior to...
US20110091037 CONTENT PROTECTION KEY ENCRYPTOR FOR SECURITY PROVIDERS  
Techniques are provided to receive at an encryption device from a control device an encryption request comprising a message and an identifier for a device. The control device and the device are...
US20110150218 METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR MANAGING AND UTILIZING CONNECTIONS BETWEEN AN APPLICATION SERVER AND AN ENTERPRISE INFORMATION SYSTEM BASED ON A DAYTONA ARCHITECTURE  
Methods for managing, and utilizing connections between an application server and an enterprise information system (EIS) based on a Daytona architecture are provided. The methods may include...
US20140266634 AUTOMATED PAIRING OF REMOTE DEVICES WITH COMPRESSED IDENTIFIERS  
In embodiments, apparatuses, methods and storage media are described that are associated with remote control of media devices. A remote control and a content player may be configured to facilitate...
US20110243322 SECURITY IN TELECOMMUNICATIONS SYSTEMS  
Security of communications between a mobile terminal 1 and a cellular network node (base station 3) is enhanced. A communication session transmitted on a first traffic channel ‘0’ is encrypted...
US20120213364 COMBINATION-BASED BROADCAST ENCRYPTION METHOD  
A combination-based broadcast encryption method includes: assigning by a server a base group of different combinations to each user; producing and sending secret information for each user by using...
US20130010953 ENCRYPTION AND DECRYPTION METHOD  
A method and apparatus are provided for encrypting a plaintext message element into a ciphertext message element associated with a random vector a first subset of encrypting users. The message...
US20140037092 METHOD AND SYSTEM OF RECONSTRUCTING A SECRET CODE IN A VEHICLE FOR PERFORMING SECURE OPERATIONS  
A method is provided for constructing a secret code in a processing unit when in communication with a portable security unit. Mutual authentication messages are exchanged between a linked portable...
US20130003971 Identifiers in a Communication System  
An identifier containing at least one encrypted part is received at a first network entity. A second network entity may then be determined based on the identifier. A request for assistance in...
US20130279695 SECURE VEHICLE-TO-VEHICLE COMUNICATION SYSTEM  
Device, system and method, in a vehicle communication system, of securely storing safety-related messages. Embodiments include both digital signing and digital encryption such that (i) stored...
US20110188653 Communication system and device  
A communication device receives secure communication frames on which a security transform has been performed to permit authentication. The communication device maintains an authentication history...
US20130083924 SYSTEMS AND METHODS FOR BROADCAST ENCRYPTION OPTIMIZATION AND SCALABILITY  
A content distribution method with broadcast encryption, comprising: executing a setup process, comprising: generating public domain parameters, generating a server secret, and generating one or...
US20130279696 METHOD FOR TRANSMITTING AND RECEIVING A MULTIMEDIA CONTENT  
A method for transmitting and receiving multimedia content having cryptoperiods scrambled by a control word includes a sender using an operating key and an encryption algorithm in a first virtual...
US20110091038 SYSTEM OF PROVIDING A FIXED IDENTIFICATION OF A TRANSPONDER WHILE KEEPING PRIVACY AND AVOIDING TRACKING  
Transponder (180) having stored a fixed identification number, which expands said identification number with a random number, encrypts said expanded number with a key, and sends it to a reader...