Match Document Document Title
US20110072262 System and Method for Identifying Security Breach Attempts of a Website  
The present invention is a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity...
US20110038480 SECURITY METHOD IN WIRELESS COMMUNICATION SYSTEM HAVING RELAY NODE  
A security method in a wireless communication system is provided, which is used for providing a plurality of security associations between a user equipment, a relay node, and a base station node...
US20100054478 SECURITY ASSET MANAGEMENT SYSTEM  
Some example embodiments described herein relate a security asset management system and a computerized method. The security asset management system includes a first server that is need of a...
US20080130898 Identifiers in a communication system  
A method and apparatus including units configured to send a request from a first network entity to a user equipment for an identifier and receive a message indicating that a public key is required...
US20100313024 Methods in Mixed Network and Host-Based Mobility Management  
A first aspect of the invention relates to a method for verifying an attachment of a mobile node to a network element in a network. A second aspect of the invention relates to a method to be...
US20130121489 System And Method For Providing Content Protection Of Linearly Consumed Content With A Bidirectional Protocol For License Acquisition  
Embodiments may include a content provider system configured to provide electronic content that includes multiple encrypted content items to a playback device. A playback device may be configured...
US20090238363 METHOD AND A SYSTEM FOR RECEIVING A MULTIMEDIA SIGNAL, A CRYPTOGRAPHIC ENTITY FOR SAID RECEPTION METHOD AND SYSTEM, AND A METHOD AND A BLACK BOX FOR PRODUCING SAID CRYPTOGRAPHIC ENTITY  
This method of receiving a multimedia signal scrambled by means of a control word uses a first cryptographic entity that can be connected to any one of P second cryptographic entities to form part...
US20110075846 SECURE COMPUTATION OF PRIVATE VALUES  
An embodiment may include a system having a communication unit and a processing unit. The communication unit may be configured to receive an encrypted private value of a party, the encrypted...
US20130101119 QUANTUM KEY DISTRIBUTION USING CARD, BASE STATION AND TRUSTED AUTHORITY  
Techniques and tools for quantum key distribution (“QKD”) between a quantum communication (“QC”) card, base station and trusted authority are described herein. In example implementations, a QC...
US20130028422 Architecture for Reconfigurable Quantum Key Distribution Networks Based on Entangled Photons Directed by a Wavelength Selective Switch  
A system and method for securing communications between a plurality of users communicating over an optical network. The system utilizes a fixed or tunable source optical generator to generate...
US20090323967 PRODUCTION OF CRYPTOGRAPHIC KEYS FOR AN EMBEDDED PROCESSING DEVICE  
A system and method for producing cryptographic keys for use by an embedded processing device within a manufactured product. A pseudo random number generator is seeded with entropy data gathered...
US20090196425 Method for Authenticating Electronically Stored Information  
A system for authenticating electronically stored information (ESI) with a first key and a second key. The comparison of the first key and the second key are used to authenticate the second...
US20130089205 Token Provisioning Method  
The present invention discloses a token provisioning method for a token provisioning system. The token provisioning method includes steps of generating at least one encryption key at a customer...
US20110280403 AUTOMATIC APPLICATION MANAGEMENT IN A SHORT-RANGE WIRELESS SYSTEM  
Method, device and computer readable storage medium for managing applications on a wireless device by providing applications on the wireless device. The wireless device is used in a short-range...
US20110274276 METHOD AND SYSTEM FOR POSITIONING MOBILE STATION IN HANDOVER PROCEDURE  
A method for obtaining a secure key is provided. The method includes sending an Access Safety Management Entity Key (KASME) to a gateway after finishing authentication and security process by a...
US20130083926 QUANTUM KEY MANAGEMENT  
Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key...
US20110066909 PLUGGABLE TRANSCEIVER MODULE WITH ENHANCED CIRCUITRY  
Pluggable transceiver modules with additional functions and circuitry contained within the module. In a first embodiment, additional circuitry is added to determine bit error rates at the point of...
US20110197073 METHOD AND APPARATUS FOR SECURE DISTRIBUTION OF DIGITAL CONTENT  
A method and apparatus for secure distribution of digital content is provided. In accordance with at least one embodiment, an intermediate device maintains an authorized content sink list which it...
US20120093311 EFFICIENT PROCEDURE FOR PAIRING MEDICAL DEVICES FOR WIRELESS COMMUNICATION WITH LIMITED USER INTERACTION  
A method for pairing a handheld diabetes managing device with an insulin pump for secure wireless communication with limited user interaction. A pump identification code that uniquely identifies...
US20140161260 MAJOR MANAGEMENT APPARATUS, AUTHORIZED MANAGEMENT APPARATUS, ELECTRONIC APPARATUS FOR DELEGATED KEY MANAGEMENT, AND KEY MANAGEMENT METHODS THEREOF  
A major management apparatus, an authorized management apparatus, an electronic apparatus for delegated key management and key management methods thereof are provided. The major management...
US20120063600 APPRAISING SYSTEMS WITH ZERO KNOWLEDGE PROOFS  
A system, method, and computer program product are provided for requesting a proof of a security policy in a Ghent system. Additionally, a system, method, and computer program product are provided...
US20140233739 METHOD FOR ADDING NODES TO A QUANTUM KEY DISTRIBUTION SYSTEM  
An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can...
US20110264907 SECURING INFORMATION WITHIN A CLOUD COMPUTING ENVIRONMENT  
Embodiments of the invention provide a solution for securing information within a Cloud computing environment. Specifically, an encryption service/gateway is provided to handle...
US20050286723 QKD system network  
QKD system networks (50, 200, 300) and methods of communicating between end-users (P1, P2) over same are disclosed. An example QKD system network (50) includes a first QKD station (A1) and a...
US20110055895 Shared scalable server to control confidential sensory event traffic among recordation terminals, analysis engines, and a storage farm coupled via a non-proprietary communication channel  
A highly secure sensory stream event server receiving and storing encrypted assets and references to those assets over a non-proprietary communications channel. A system for selectively decrypting...
US20110010541 Interoperable keychest for use by service providers  
There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key...
US20110206205 ENCRYPTION KEY DISTRIBUTION METHOD IN MOBILE BROADCASTING SYSTEM AND SYSTEM FOR THE SAME  
A method and a system for distributing an encryption key for service protection and content protection in a mobile broadcasting system are provided where a network generates a first encryption key...
US20110154031 Secure Kerberized Access of Encrypted File System  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
US20110258437 SECURE LOCAL UPDATE OF CONTENT MANAGEMENT SOFTWARE  
This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys...
US20050219037 Cargo theft prevention method and system  
A cargo theft prevention method is disclosed. According to the method, a security device for sealing a cargo container and a communication system capable of being in communication with a sealer...
US20120155646 SUPPORTING DNS SECURITY IN A MULTI-MASTER ENVIRONMENT  
Multiple peer domain name system (DNS) servers are included in a multi-master DNS environment. One of the multiple peer DNS servers is a key master peer DNS server that generates one or more keys...
US20100322418 Hardware Based Cryptography  
Technologies are generally described for a hardware cryptographic unit that employs hardware public physically unclonable functions. A source computer can encrypt a message using a simulation of a...
US20110150214 COORDINATED VIEWING EXPERIENCE AMONG REMOTELY LOCATED USERS  
A method of viewing a content item is provided. The method includes receiving an encrypted content item and a network address of a key management system from a primary client device over a...
US20100310074 ENCRYPTION SYSTEM FOR VOCAL COMMUNICATIONS  
An encryption system for audio or vocal communications, including a device for encrypted communication with a similar device, said device including at least one bluetooth chip arranged to effect a...
US20090199016 Storage system, and encryption key management method and encryption key management program thereof  
A user no longer needs to restore key information upon restoring data. Proposed is a storage system having a storage apparatus, a tape library apparatus for backing up data stored in the storage...
US20110170694 Hierarchical Key Management for Secure Communications in Multimedia Communication System  
In a communication system wherein a first computing device is configured to perform a key management function for first user equipment and a second computing device is configured to perform a key...
US20050225432 Method for transporting an alarmed container  
The present invention relates to a method or process concerning the transportation of an alarmed container (1), particularly with regard to the transportation of valuable objects or valuable...
US20100088515 SCRAMBLE KEY MANAGEMENT UNIT, SCRAMBLE KEY MANAGEMENT INFORMATION TRANSMITTING UNIT, METHOD FOR SCRAMBLE KEY OUTPUT MANAGEMENT, SCRAMBLE KEY MANAGEMENT PROGRAM, LICENSE INFORMATION MANAGEMENT UNIT, LICENSE MANAGEMENT INFORMATION TRANSMITTING UNIT, METHOD FOR LICENSE INFORMATION OUTPUT MANAGEMENT, AND LICENSE INFORMATION MANAGEMENT PROGRAM  
A low cost scramble key management apparatus which enables to manage a scramble key based on individual contract information and to ensure security in narrow band broadcasting. The scramble key...
US20100306544 SECURE COMPUTING ENVIRONMENT IN A TRANSPORTABLE CONTAINER  
A secure container can comprise a security server, one or more container servers, and one or more sensors that can detect a breach of the physically secure computing environment provided by the...
US20110013775 System and method of mobile content sharing and delivery in an integrated network environment  
A system and method of mobile content sharing and delivery in an integrated network environment, comprising; a first mobile terminal serving as information provider, a home server, and a second...
US20130266144 Architecture for Reconfigurable Quantum Key Distribution Networks Based on Entangled Photons by Wavelength Division Multiplexing  
A system and method for securing communications over a wave division multiplexing optical network between a plurality of users connected to the network. The system utilizes a primary optical...
US20150139425 KEY MANAGING SYSTEM AND METHOD FOR SENSOR NETWORK SECURITY  
Disclosed are a key managing system and method for sensor network security. The key managing system includes a secret key transmitter configured to transmit a portion of a secret key map, stored...
US20110072264 Secure information storage and retrieval apparatus and method  
A user using a client computer registers with a server computer over a computer network by submitting a biometric scan of a body part of the user. The user commands the client computer to encrypt...
US20090169019 METHOD AND SYSTEMS USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS  
A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate...
US20110197065 SECURE AND AUTOMATED CREDENTIAL INFORMATION TRANSFER MECHANISM  
A mechanism for securely transmitting credentials to instantiated virtual machines is provided. A central server is used to turn on a virtual machine. When the virtual machine is turned on, the...
US20110243330 AUTHENTICATION ASSOCIATED SUITE DISCOVERY AND NEGOTIATION METHOD  
An authentication associated suite discovery and negotiation method for ultra wide band network. The method includes the following steps of: 1) adding a pairwise temporal key PTK establishment IE...
US20120300937 ACCESS CONTROL  
Control apparatus (30), systems and methods for enabling access to one or more information systems (36) by one or more entities (34) on a path across a supply network to be controlled, access to...
US20080044028 Pair-wise key pre-distribution method for wireless sensor network  
The present invention provides a method regarding key deployment in wireless sensor networks, that is, with random anticipated disposition mechanism as basis, a key management mechanism is designed.
US20110255695 KEY MANAGEMENT METHOD  
The present invention relates to a key management method to establish selective secret information in multiple disjoint groups, more specifically to a method of reducing the broadcast size in...
US20120294445 CREDENTIAL STORAGE STRUCTURE WITH ENCRYPTED PASSWORD  
In accordance with one or more aspects, a storage structure including both an encrypted credential and an encrypted password is obtained. A key can be obtained from a key distribution service and...