Matches 1 - 50 out of 437 1 2 3 4 5 6 7 8 9 >


Match Document Document Title
US20110246764 USER AUTHENTICATION SYSTEM  
An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests...
US20110131414 METHODS AND SYSTEMS FOR END-TO-END SECURE SIP PAYLOADS  
Methods, systems and communication nodes for protecting Session Initiation Protocol (SIP) message payloads are described. Different protection techniques can be used to protect SIP payloads...
US20150227930 HOMOMORPHIC PASSCODE ENCRYPTION  
A method of encrypting a passcode is disclosed. In one embodiment, the method includes: receiving an indication of a portion of the passcode; calculating a plaintext value based at least in part...
US20140177827 SYSTEM AND METHOD FOR SECURING SCALAR MULTIPLICATION AGAINST SIMPLE POWER ATTACKS  
The system and method for securing scalar multiplication against simple power attacks (SPAs) delays required point additions in elliptic curve cryptosystem scalar multiplication. A buffer is used...
US20120114117 Methods And Apparatus For Performing An Elliptic Curve Scalar Multiplication Operation Using Splitting  
For an Elliptic Curve Scalar Multiplication (ECSM) operation to be performed on a scalar and a base point, a given previous set of parameters that was used to split the scalar for a previous ECSM...
US20100019031 Forged Card Discrimination System  
A forged card discrimination system, an authenticity determination information writing device and a forged card discrimination device which can directly utilize an existing cash card or a credit...
US20120109419 LOCKABLE COMPARTMENT ACCESS MANAGEMENT  
Apparatus, systems, and methods may operate to receive reservation requests for travel reservations associated with a common carrier. Responsive to receiving a request, an access control code to...
US20130108040 METHOD AND APPARATUS FOR PROVIDING IDENTITY BASED ENCRYPTION IN DISTRIBUTED COMPUTATIONS  
An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure...
US20110007895 Secure Configuration of a Computing Device  
In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital...
US20100316215 METHOD OF SHARING A STRONG SECRET BETWEEN TWO PARTIES, ONE OF WHOM HAS LITTLE PROCESSING POWER  
The invention relates to a method of sharing a strong secret F between two parties (A, B) previously sharing a weak secret F, this method of sharing combining a symmetric algorithm and an...
US20150180657 TECHNIQUES FOR ENFORCING A DEPTH ORDER POLICY FOR GRAPHICS IN A DISPLAY SCENE  
Various embodiments are generally directed an apparatus and method for processing an encrypted graphic with a decryption key associated with a depth order policy including a depth position of a...
US20140163852 METHOD FOR ALLOWING MISSIONS OF UNMANNED AERIAL VEHICLES, IN PARTICULAR IN NON-SEGREGATED AIR SPACES  
A method for allowing missions of unmanned aerial vehicles (UAV), in particular in non-segregated air space, includes the steps of: prearranging a flight plan by an operator of an unmanned aerial...
US20050195975 Digital media distribution cryptography using media ticket smart cards  
FIG. 7 of the drawings depicts an overall view of this invention which relates to a new method or process for a system used to do digital media distribution in an architecture of public key...
US20120140920 RNA-BASED CRYPTOGRAPHIC SYSTEM AND METHOD  
The RNS-based cryptographic system and method uses a symmetric residue number system (RNS) for encryption and decryption of messages, i.e., the sender and receiver agree upon a set of relatively...
US20110085658 System and Method for Comparison of Private Values  
An embodiment includes a first system for computing a contribution to a greater-than comparison of a first private value and a second private value. The first system includes: an accessing unit...
US20100322418 Hardware Based Cryptography  
Technologies are generally described for a hardware cryptographic unit that employs hardware public physically unclonable functions. A source computer can encrypt a message using a simulation of a...
US20120121084 PUBLIC KEY ENCRYPTION SYSTEM USING ERROR CORRECTING CODES  
This invention provides improved security and improved throughput of the McEliece public key encryption system and reduces the public key size. Even though the public key is reduced, in some...
US20150110266 COUNTERMEASURE METHOD AGAINST SIDE CHANNEL ANALYSIS FOR CRYPTOGRAPHIC ALGORITHMS USING BOOLEAN OPERATIONS AND ARITHMETIC OPERATIONS  
The present invention relates to a countermeasure method against side channel analysis for cryptographic algorithm using Boolean operations and arithmetic operation. To protect a cryptographic...
US20100040227 Collaborative, Incremental Specification Of Identities  
Methods and systems for collaborative, incremental specification of identities are provided. Users of an information processing system collaborate to define and refine identities of entities, and...
US20110235799 METHOD AND APPARATUS FOR QUERYING CONTENT PROTECTED BY IDENTITY-BASED ENCRYPTION  
An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at...
US20060104439 Method and system for shifting key agreement status and information storage medium  
A method for shifting a key agreement status in a public-key cryptographic protocol that allows key agreement between three devices includes the steps of, under condition that allow key agreement...
US20150222422 SYSTEMS AND METHODS FOR FASTER PUBLIC KEY ENCRYPTION USING THE ASSOCIATED PRIVATE KEY PORTION  
Systems and methods for faster public key encryption using the associated private key portion are described, including encrypting a plaintext into a ciphertext, where the encrypting uses a public...
US20140064480 SECURE PROVISIONING IN AN UNTRUSTED ENVIRONMENT  
Embodiments of methods of provisioning an electronic circuit enable security of sensitive data in a design and manufacturing process that includes multiple parties. In an illustrative embodiment,...
US20080165955 PASSWORD PROTOCOLS USING XZ-ELLIPTIC CURVE CRYPTOGRAPHY  
Remote user authentication is provided using a password protocol based on elliptic curve cryptography. More specifically, the process uses the X-coordinate and the Z-coordinate of an elliptic...
US20100303230 Secure Identity Binding (SIB)  
A system includes a tag having a machine readable tag identifier (Tag ID) configured to be read by a reader; and a device to be identified by the tag, in which: the device is configured to...
US20110243321 SCRAMBLING OF A CALCULATION PERFORMED ACCORDING TO AN RSA-CRT ALGORITHM  
A method and a circuit for scrambling an RSA-CRT algorithm calculation by an electronic circuit, in which a result is obtained from two modular exponentiation calculations, each providing a...
US20130294600 PUBLIC KEY ENCRYPTION WITH DIGITAL SIGNATURE SCHEME  
An improved encryption and digital signature system and method in accordance with the invention reuses an encryption ephemeral key pair from an encryption process in a digital signature process....
US20090110199 Toolbar Signature  
A method and system are provided for a web browser toolbar signature. In one example, the method includes receiving a submission of user content from a source webpage, receiving a producer...
US20090100267 Signatures with confidential message recovery  
A portion of the signed message in an ECPVS is kept truly confidential by dividing the message being signed into at least three parts, wherein one portion is visible, another portion is...
US20150055777 METHOD OF ESTABLISHING PUBLIC KEY CRYPTOGRAPHIC PROTOCOLS AGAINST QUANTUM COMPUTATIONAL ATTACK  
The present invention relates to information security and discloses a method of establishing public key cryptographic protocols against the quantum computational attack. The method includes the...
US20130136257 DECRYPTION APPARATUS AND METHOD OF DECRYPTING CIPHERTEXT OF THE SAME  
The method of decrypting a ciphertext includes: pre-storing a plurality of polynomial functions into which a secret key decrypting a ciphertext to a plaintext according to a public-key...
US20080031459 Systems and Methods for Identity-Based Secure Communications  
Methods and systems for securing communications between networked computer agents in a positively identifiable manner, using a centralized arbitration computer agent that acts as a trusted third...
US20090025061 CONDITIONAL PEER-TO-PEER TRUST IN THE ABSENCE OF CERTIFICATES PERTAINING TO MUTUALLY TRUSTED ENTITIES  
A method, apparatus, and electronic device for protecting digital rights are disclosed. A network interface may receive a rights representation for a set of digital content from a source entity. A...
US20080144810 Factoring Based Modular Exponentiation  
The present disclosure provides a system and method for performing modular exponentiation. The method may include dividing a first polynomial into a plurality of segments and generating a first...
US20080226066 APPARATUS FOR BATCH VERIFICATION AND METHOD USING THE SAME  
A batch verification apparatus and method wherein, the method includes: generating a plurality of secret keys, a plurality of public keys corresponding to the plurality of secret keys, and a...
US20090214038 SECURITY-ENHANCED RFID SYSTEM  
The present invention relates to RFID systems. In particular, the invention relates to an RFID system having enhanced security of communication between a tag and a tag reader. In a first aspect of...
US20130094649 PUBLIC KEY CRYPTOSYSTEM BASED ON GOPPA CODES AND PUF BASED RANDOM GENERATION  
This invention provides improved security of the McEliece Public Key encryption system adding features which make full use of random number generation for given message and cryptogram parameters,...
US20100223478 SYSTEM AND METHOD FOR PERFORMING EXPONENTIATION IN A CRYPTOGRAPHIC SYSTEM  
There are disclosed systems and methods for computing an exponentiatied message. In one embodiment blinding is maintained during the application of a Chinese Remainder Theorem (CRT) algorithm and...
US20100318788 METHOD OF MANAGING SECURE COMMUNICATIONS  
An exemplary method of managing secure communications between nodes includes receiving a public key of a node associated with a certification authority. A root node certificate is provided to the...
US20080170701 Delegation system for decryption rights  
An object of this ciphertext decryption rights delegation system is to enable conversion of PKE-system ciphertext into IBE-system encrypted ciphertext, and, in a delegation system with users using...
US20110206200 METHOD AND APPARATUS FOR APPLYING RECIPIENT CRITERIA IN IDENTITY-BASED ENCRYPTION  
An approach is provided for reducing communication traffic and cost by applying recipient criteria in identity-based encryption. A recipient criterion application selects one or more recipient...
US20110191585 Device Authentication  
Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of...
US20080056489 SCRAMBLING OF A CALCULATION PERFORMED ACCORDING TO AN RSA-CRT ALGORITHM  
A method and a circuit for scrambling an RSA-CRT algorithm calculation by an electronic circuit, in which a result is obtained from two modular exponentiation calculations, each providing a...
US20080310625 DIGITAL SIGNATURE ON A SMARTCARD  
A digital signature scheme for a “smart” card utilizes a set of prestored signing elements and combines pairs of the elements to produce a new session pair. The combination of the elements is...
US20130016831 Method and Apparatus For Computing A Shared Secret Key  
A method of generating a key by a first correspondent. The key is computable by a second correspondent by a second correspondent. The method comprising the steps of: a) making available to the...
US20080010467 Privacy-preserving concatenation of strings  
A system for contributing to a concatenation of a first string and a second string may include a communication unit to receive an encrypted representation of a second share of the second string,...
US20150180664 OPTIMIZED HARDWARD ARCHITECTURE AND METHOD FOR ECC POINT ADDITION USING MIXED AFFINE-JACOBIAN COORDINATES OVER SHORT WEIERSTRASS CURVES  
An optimized hardware architecture and method introducing a simple arithmetic processor that allows efficient implementation of an Elliptic Curve Cryptography point addition algorithm for mixed...
US20070248224 METHOD FOR ELLIPTIC CURVE PUBLIC KEY CRYPTOGRAPHIC VALIDATION  
Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a...
US20060222175 Computation method, computing device and computer program  
The computing device calculates an equivalence H0≡2m*k+1 (mod n) relating to a divisor n of 2m*k+1 (step A), computes an equivalence H≡2E(p, m, k) (mod n) of 2E(p, m, k) (mod n) from H0 by an REDC...
US20100030694 METHOD FOR SECURING IP CONNECTIONS FOR NETWORK OPERATOR COMBINATORY CONNECTIONS  
The invention relates to a method for securing IP connections with a combinatory connection of a communication network of a first network operator with a communication network of at least one...

Matches 1 - 50 out of 437 1 2 3 4 5 6 7 8 9 >