Sign up

AcclaimIP-ad

Match Document Document Title
US20130148809 COMPUTING THE ETH ROOT OF A NUMBER USING A VARIANT OF THE RSA ALGORITHM (FOR EVEN E'S)  
An Eth root unit is configured to compute an Eth root of a number A with a machine. The Eth root unit locates a value E, which is even, in a first entry of a plurality of entries of a structure....
US20140105401 LEVEL-ONE ENCRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20100262545 SYSTEMS AND METHODS FOR CONSTRUCTING A LOCAL ELECTRONIC MEDICAL RECORD DATA STORE USING A REMOTE PERSONAL HEALTH RECORD SERVER  
Certain embodiments of the present invention provide systems and methods for managing medical information. Certain embodiments provide a local electronic medical record system including a local...
US20110064225 SECURITY COUNTERMEASURE FOR POWER ANALYSIS ATTACKS  
A countermeasure for differential power analysis attacks on computing devices. The countermeasure includes the definition of a set of split mask values. The split mask values are applied to a key...
US20080152145 ASSET BRING-OUT MANAGEMENT SYSTEM, ASSET BRING-OUT MANAGEMENT METHOD, BROUGHT OUT ASSET, BROUGHT OUT ASSET CONTROL PROGRAM  
An asset bring-out management system includes a brought out asset, a managing system, an encryption determining unit, and a brought out information registering unit. The managing system manages...
US20110066861 DIGITAL CONTENT MANAGEMENT AND DELIVERY  
Methods, systems, and apparatus for digital content management and distribution are provided. In an example, a plurality of unique keys can be provide, wherein each unique key corresponding to one...
US20110200194 AMBULATORY REPEATER FOR USE IN AUTOMATED PATIENT CARE  
An ambulatory repeater for use in automated patient care is presented. A local memory store includes a cryptographic key, sensitive information, and physiological measures. The cryptographic key is...
US20130003976 TECHNIQUES FOR ACCESSING FEATURES OF A HARDWARE ADAPTER  
A technique for accessing features of a hardware adapter includes reading a first key from a hardware adapter and attempting to decrypt the first key with a second key. In response to the second...
US20130124862 System And Method For Digital Rights Management With Secure Application-Content Binding  
Various embodiments of a system and method for digital rights management with secure application-content binding are described. Various embodiments may include a system configured to decrypt an...
US20120308010 Method and Apparatus for Processing Entitlement Control Message Packets  
A method for processing Entitlement Control Message (ECM) packets is disclosed in the present invention. The method includes: a terminal receiving a broadcast code stream multiplexing frame and...
US20080148068 Storage Media to Storage Drive Centric Security  
A secure data system employs a storage media and a storage drive. A storage media identification key is embedded in a non-user modifiable area of the storage media and associated with data recorded...
US20110004765 LICENSE MANAGING METHOD AND DEVICE  
A license managing device sets a security area for storing a license file, maintains the security area as an encoded file in an inactive state of the security area by encoding the security area,...
US20110317840 SYSTEM AND METHOD OF PERFORMING AUTHENTICATION  
Disclosed herein are systems, method and computer readable medium for providing authentication of an entity B by an entity A. In the method, entity A selects a value p, a range [a, b] and a...
US20110055545 METHOD AND APPARATUS FOR ENCODING DECISION DIAGRAMS  
An approach is provided for reducing decision diagram related communication traffic and cost by encoding decision diagrams. A hash identifier application constructs a reduced ordered binary...
US20110317834 SYSTEM AND METHOD FOR SECURE MESSAGING IN A HYBRID PEER-TO-PEER NETWORK  
An improved system and method are disclosed for peer-to-peer communications. In one example, the method enables endpoints to securely send and receive messages to one another within a hybrid...
US20110158405 KEY MANAGEMENT METHOD FOR SCADA SYSTEM  
Disclosed is a shared key management method for SCADA system in which a master terminal unit (MTU), a plurality of sub-master terminal units (sub-MTUs), and a plurality of remote terminal units...
US20100019031 Forged Card Discrimination System  
A forged card discrimination system, an authenticity determination information writing device and a forged card discrimination device which can directly utilize an existing cash card or a credit...
US20070189541 Method and system for initialzing a key management system  
A network system for key management including a server, a key management system providing process logic for key management system initialization located on the server, a key management system...
US20110145569 METHOD AND SYSTEM FOR PROVISIONING MULTIPLE DIGITAL CERTIFICATES  
A method of provisioning a first digital certificate and a second digital certificate based on an existing digital certificate includes receiving information related to the existing digital...
US20120140928 METHOD AND APPARATUS FOR EXTENDING A KEY-MANAGEMENT PROTOCOL  
A method and apparatus for modifying the Multimedia Internet KEYing (MIKEY) protocol to support an extended key-management message (KMM), wherein the apparatus programs a computer to perform the...
US20120210120 SELF-ENCRYPTION PROCESS  
This invention is a network that is defined by its novel approach to privacy, security and freedom for its users. Privacy by allowing access anonymously, security by encrypting and obfuscating...
US20080049939 Mitigating dictionary attacks on password-protected local storage  
The invention includes a method for key creation and recovery based on solutions to puzzles solvable by humans and not computers. In some exemplary embodiments, the key is created and recovered...
US20120140929 INTEGRATED CIRCUITS SECURE FROM INVASION AND METHODS OF MANUFACTURING THE SAME  
An integrated circuit device that is secure from invasion and related methods are disclosed herein. Other embodiments are also disclosed herein.
US20110243331 SHARED RANDOM NUMBERS MANAGEMENT METHOD AND MANAGEMENT SYSTEM IN SECRET COMMUNICATION NETWORK  
In a secret communication network including a center node and multiple remote nodes, the center node is provided with a virtual remote node which functions as a remote node similar to each of the...
US20110091037 CONTENT PROTECTION KEY ENCRYPTOR FOR SECURITY PROVIDERS  
Techniques are provided to receive at an encryption device from a control device an encryption request comprising a message and an identifier for a device. The control device and the device are...
US20090257589 MONITORING CAMERA SYSTEM, IMAGING DEVICE, AND VIDEO DISPLAY DEVICE  
An imaging device (1) for imaging a subject and distributing the captured video. The privacy of the subject is adequately protected, and a required monitoring function is realized. The imaging...
US20110038481 HIERARCHIZATION OF CRYTOGRAPHIC KEYS IN AN ELECTRONIC CIRCUIT  
A method of obtaining, in an electronic circuit, at least one first key intended to be used in a cryptographic mechanism, on the basis of at least one second key contained in the same circuit, the...
US20110010541 Interoperable keychest for use by service providers  
There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key...
US20110182430 NAME ENCRYPTION DEVICE, PSEUDONYMIZATION DEVICE, NAME ENCRYPTION METHOD, AND PSEUDONYMIZATION METHOD  
Provided is a name encryption device which suppresses leak and facilities the zero-knowledge proof by making the pseudonymization process to be a simple algebraic calculation. The name encryption...
US20100306543 Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens  
An embodiment of the present invention provides a computer implemented method for the transfer of private information of one user to another user—a primitive known as Oblivious Transfer. An o...
US20120148048 METHOD FOR ENCRYPTING CONTENT, METHOD FOR DECRYPTING CONTENT AND ELECTRONIC APPARATUS APPLYING THE SAME  
A method for encrypting content includes using a plurality of different encryption schemes to produce encrypted content. Encryption information is provided so as to indicate which of the plurality...
US20110173259 COMMUNICATING IN A PEER-TO-PEER COMPUTER ENVIRONMENT  
Communicating in a peer-to-peer computer environment. A request is received from a user at a peer provider node computer system, wherein the request is signed by a private key. Provided a public...
US20130159699 Password Recovery Service  
According to aspects of the present invention there are provided methods and apparatus for enabling a user to secure and back-up an encryption key for use by a client device in encrypting and...
US20110029780 Systems and Methods for Conducting Transactions and Communications Using a Trusted Third Party  
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie,...
US20070147619 Methods and system for managing security keys within a wireless network  
A system for managing security keys in a wireless network includes a manufacturer certification authority (MCA) for providing a signed digital MCA certificate for installation into a new network...
US20110202765 SECURELY MOVE VIRTUAL MACHINES BETWEEN HOST SERVERS  
A virtual hard drive is moved as an at least partially encrypted file to a different computing device. A key is provided to the different computing device in a protected form and a user on the...
US20130077791 REVOCATION LIST GENERATION DEVICE, REVOCATION LIST GENERATION METHOD, AND CONTENT MANAGEMENT SYSTEM  
Provided is a revocation list generation device that can suppress an increase in the amount of data of a revocation list. A revocation list generation device 500g that generates a revocation list...
US20090010438 Security mechanism for wireless video area networks  
A device is disclosed including a security module to generate and update cryptographic keys to establish a secure relationship between the device and one or more station devices in a wireless video...
US20100080392 Key Management In Storage Libraries  
Embodiments include methods, apparatus, and systems for managing encryption keys in a storage library. One method includes using a tape library to determine which key manager is selected for data...
US20110299687 AUTOMATED KEY MANAGEMENT SYSTEM AND METHOD  
A system and method for automatic key and certificate management is disclosed. In particular, a key store in a base computer contains both new and previously viewed cryptographic keys. In one...
US20110170694 Hierarchical Key Management for Secure Communications in Multimedia Communication System  
In a communication system wherein a first computing device is configured to perform a key management function for first user equipment and a second computing device is configured to perform a key...
US20140050317 Cloud Key Management System  
This invention uses a cloud-based key management system to store, retrieve, generate, and perform other key operations. The cloud-based system ensures security of the keys while preventing their...
US20140140512 REQUESTED AND ALLOWED CRYPTOGRAPHIC OPERATIONS COMPARISON  
Embodiments herein relate to cryptographic operations. A process identifier (PID) identifying a process requesting a cryptographic operation is received. Next, at least one allowed cryptographic...
US20100306544 SECURE COMPUTING ENVIRONMENT IN A TRANSPORTABLE CONTAINER  
A secure container can comprise a security server, one or more container servers, and one or more sensors that can detect a breach of the physically secure computing environment provided by the...
US20080285748 Method for generating secret key in computer device and obtaining the encrypting and decrypting key  
The invention relates to a method for generating an secret key in a computer device and using the secret key. The method includes the step of receiving an inputted password first, then processing...
US20100011221 Secured storage device with two-stage symmetric-key algorithm  
A secured storage device uses a user key set by user to encrypt a primary key that is for encryption or decryption of user data, to produce a first encrypted data. In the secured storage device,...
US20090129595 Verification of a product identifier  
A system and method for enabling the verification of the authenticity of a product identification circuit, wherein the checking is based on an encryption key (11) stored to the product...
US20140105400 AUTOMATIC RECOVERY OF TPM KEYS  
A trusted platform module (TPM) is a silicon chip that constitutes a secure encryption key-pair generator and key management device. A TPM provides a hardware-based root-of-trust contingent on the...
US20110019820 COMMUNICATION CHANNEL CLAIM DEPENDENT SECURITY PRECAUTIONS  
A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication...
US20110276490 SECURITY SERVICE LEVEL AGREEMENTS WITH PUBLICLY VERIFIABLE PROOFS OF COMPLIANCE  
Techniques are described herein that are capable of providing security guarantees in security service level agreements (SLAB). For instance, a security SLA may specify a level of service to be...