Match Document Document Title
US20080123862 Secure information transfer using dedicated public key pairs  
A method and apparatus for secure information transfer using dedicated public key pairs for articles of information. A first public key pair may be generated for an article of information. The...
US20100020965 METHOD FOR SPEEDING UP THE COMPUTATIONS FOR CHARACTERISTIC 2 ELLIPTIC CURVE CRYPTOGRAPHIC SYSTEMS  
In some embodiments, an apparatus and method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems are described. In one embodiment, a multiplication routine...
US20140023192 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND COMMUNICATION SYSTEM  
According to an embodiment, a communication device is connected to a key generating device which generates an encryption key. The communication device includes an obtaining unit and a calculator....
US20060126835 High-speed GCM-AES block cipher apparatus and method  
A high-speed Galois Counter Mode-Advanced Encryption Standard (GCM-AES) block cipher apparatus and method is provided. The apparatus can operate at a low clock frequency of 125 MHz and provide a 2...
US20140093073 Method and System for a Hardware-Efficient Universal Hash Function  
Disclosed method, system and computer readable storage medium embodiments for providing hardware-efficient universal hashing functions include performing a first hash function on a received input...
US20100325423 System and Method for Securing an Electronic Communication  
A system for securing an electronic communication comprises a gateway server configured to receive and store a device identifier and a network address from a first computing device. The device...
US20110085665 Method For Generating Dynamic Group Key  
A method of generating a dynamic group key of a group formed of a plurality of nodes, the method including: unicasting a public key that is based on respective secret keys of each of a plurality...
US20100024014 HTTP AUTHENTICATION AND AUTHORIZATION MANAGEMENT  
Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include a source processor that is used to identify the source...
US20090249072 METHOD FOR GENERATING RIGHTS OBJECT AND DEVICE TO PERFORM THE METHOD, METHOD FOR TRANSMITTING RIGHTS OBJECT AND DEVICE TO PERFORM THE METHOD, AND METHOD FOR RECEIVING RIGHTS OBJECT AND DEVICE TO PERFORM THE METHOD  
A method for transmitting a Rights Object (RO) includes generating a password key by encrypting a password, generating the RO using the password key, and transmitting the RO from a first device to...
US20080304660 IMAGE FORMING APPARATUS ALLOWING EASY MANAGEMENT RELATING TO USER'S USAGE  
An MFP 1 reads file information and directory information from a mounted medium to calculate a hash value, and encrypts the hash value and a user name of a user logged thereinto to create an...
US20100067701 Method and System for High Rate Uncorrelated Shared Secret Bit Extraction From Wireless Link Characteristics  
A new methodology to exchange a random secret key between two parties. The diverse physical characteristics of the wireless medium and device mobility are exploited for secure key exchange. Unique...
US20110085660 AES ALGORITHM-BASED ENCRYPTION APPARATUS AND METHOD FOR MOBILE COMMUNICATION SYSTEM  
A method and apparatus for improving hardware flexibility for encrypting data based on the Advanced Encryption Standard (AES) block algorithm is provided. An encryption apparatus is equipped with...
US20090307474 STORING A DEVICE MANAGEMENT ENCRYPTION KEY IN A NETWORK INTERFACE CONTROLLER  
A device management system for securely storing an encryption key associated with a device management session. The device management system includes an encryption key generator to generate an...
US20100257356 CONCEPT FOR A KEY MANAGEMENT IN A DRM SYSTEM  
There is disclosed a cryptographic key management concept for a user domain, in which a local rights manager (LRM) is provided a cryptographic generation key for validly generating or converting...
US20100037327 SYSTEM FOR MANAGING HARDWARE RESOURCES, COMPUTER SYSTEM, METHOD FOR MANAGING HARDWARE RESOURCES, AND PROGRAM  
A system for managing hardware resources includes a computer system and a management server, wherein the computer system includes a static authentication key generation unit that generates...
US20080165956 Content Encryption Schema For Integrating Digital Rights Management With Encrypted Multicast  
Systems and methods provide a content encryption schema for integrating digital rights management (DRM) in a multicast/broadcast encryption system. In one implementation, an exemplary integrated...
US20080273697 Use of Indirect Data Keys for Encrypted Tape Cartridges  
A method, system and program are provided for enabling selective access to multiple users' encrypted data in a single storage cartridge. A unique, derived key is generated for each user's data by...
US20080037775 Verifiable generation of weak symmetric keys for strong algorithms  
The present invention provides a method, system, and device for producing cryptographic keys. More specifically, the cryptographic keys may be produced such that they have an effective key size...
US20070014398 Generating a secret key from an asymmetric private key  
Embodiments of the present invention address deficiencies of the art in respect to symmetric key generation and provide a method, system and computer program product for symmetric key generation...
US20120096262 System and method of generating encryption/decryption keys and encrypting/decrypting a derivative work  
A derivative work is encrypted using master keys generated from source data extracted from digital sources used to create the derivative work. A software application permits a mix artist to...
US20100183150 Shared key management method, shared key generating method and message communication method for scada system, and recording medium  
A shared key management method for a Supervisory Control And Data Acquisition (SCADA) system in which a master terminal unit (MTU), a plurality of sub master terminal units (SUB-MTUs), and a...
US20080155269 Biometric authentication system and method thereof and user identification information product  
The biometric authentication system of this invention includes user identification information product and authentication side system. The user identification information product acquires...
US20080152151 HIGHLY AVAILABLE CRYPTOGRAPHIC KEY STORAGE (HACKS)  
A system and method for managing trusted platform module (TPM) keys utilized in a cluster of computing nodes. A cluster-level management unit communicates with a local TPM agent in each node in...
US20080298596 IMAGE ENCRYPTION/DECRYPTION SYSTEM  
When decrypting an image of a part of a document that is encrypted and therefore illegible, a user uses a decryption apparatus 15 to read the document as an electronic image and also to receive a...
US20130003966 Cryptographic hardware module and method for updating a cryptographic key  
A cryptographic hardware module has an arithmetic unit, a memory storing at least one first key, a logic and a cryptographic device. The hardware module loads at least one second encrypted key...
US20100034376 INFORMATION MANAGING SYSTEM, ANONYMIZING METHOD AND STORAGE MEDIUM  
After anonymization of individual information such as clinical data, only the owner of a specimen data or the owner of a browsing right can identify data stored or related to it after the...
US20090310777 Trust Anchor Key Cryptogram and Cryptoperiod Management Method  
In the field of public key cryptography, e.g. a public key infrastructure, the distribution of trust anchor keys to end-user systems is difficult when the time comes to change the public key,...
US20080165957 VIRTUALIZATION OF FILE SYSTEM ENCRYPTION  
A computer implemented method, apparatus, and computer program product for using a virtual file system to encrypt files. The process registers a plurality of file systems on a data processing...
US20060159260 Method and communication system employing secure key exchange for encoding and decoding messages between nodes of a communication network  
A method encodes and decodes messages between nodes of a wireless communication network. A first node, such as a fob, is mated with a second node, such as a base station, of the wireless...
US20100027785 DEVICE AND METHOD FOR SECURITY HANDSHAKING USING MIXED MEDIA  
A method and device for private/public key encryption using optical media. A key pair is generated, and the public key pair is stored on the optical media. The media is scanned and the optical...
US20080031445 Key Binding Method and Applications Capable of Dynamic Key Generation  
A key binding method capable of dynamic key generation includes the following steps: (a) dynamically generating key information for an identification-pending device; (b) transforming the key...
US20100166188 IMPLICIT CERTIFICATE SCHEME  
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a...
US20090034739 KEY ISSUING METHOD, GROUP SIGNATURE SYSTEM, INFORMATION PROCESSING APPARATUS, AND PROGRAM  
There is provided in accordance with the present invention a key issuing method for being performed by a user apparatus in a group signature system including the user apparatus and an issuer...
US20070211896 ENCRYPTION AND DECRYPTION PROGRAMS AND CRYPTOSYSTEM  
An encryption computer program product, in a computer readable medium, including instructions executed by a computer for causing the computer to implement a method of encrypting input data,...
US20100329454 ENCRYPTION PARAMETER SETTING APPARATUS, KEY GENERATION APPARATUS, CRYPTOGRAPHIC SYSTEM, PROGRAM, ENCRYPTION PARAMETER SETTING METHOD, AND KEY GENERATION METHOD  
A sophisticated cryptographic system is realized without using a pairing operation on a composite order. A random matrix selection unit 142 randomly selects a random matrix V* from a plurality of...
US20110289315 Generic Bootstrapping Architecture Usage With WEB Applications And WEB Pages  
A method includes receiving at a network application function a request related to a generic bootstrapping architecture key originated from a user equipment. The received request includes a...
US20080250249 Data access method against cryptograph attack  
The present invention discloses a data access method accomplished by the following steps of: creating a predetermined password; generating a first encryption key; encrypting data based on the...
US20090310778 VARIABLE-LENGTH CIPHER SYSTEM AND METHOD  
Systems and methods for enciphering data are provided. In one embodiment, information is enciphered using a variable block length cipher that returns the encrypted symbol set in the same format as...
US20100158246 METHOD FOR AUTHENTICATION AND ELECTRONIC DEVICE FOR PERFORMING THE AUTHENTICATION  
An authentication method (100) for a secure data transmission is provided, the method comprising performing a first authentication protocol (101) by using a first cipher and performing a second...
US20080199013 NETWORK SET-UP DEVICE  
A network device adapted to communicate with other devices over a network, the device being arranged to, when the device is connected to a physical data carrier, automatically store a...
US20080034212 METHOD AND SYSTEM FOR AUTHENTICATING DIGITAL CONTENT  
A method and system is described to authenticate the sender of digital content, by combining the functionality of a key distribution server with the one of a mail server. This system allows the...
US20130003967 Enhanced Key Management For SRNS Relocation  
A method comprises maintaining, in a first node serving a mobile terminal over a connection protected by at least one first key, said first key and information about the key management...
US20100220862 Method, Apparatus And Computer Program Product For Providing Security During Handover Between A Packet-Switched Network And A Circuit-Switched Network  
A method, apparatus and computer program product are provided to facilitate security in response to a handover from an initial network to a subsequent network, such as a handover between a...
US20090296926 KEY MANAGEMENT USING DERIVED KEYS  
Some embodiments of the present invention provide a system that generates and retrieves a key derived from a master key. During operation, the system receives a request at a key manager to...
US20080095368 SYMMETRIC KEY GENERATION APPARATUS AND SYMMETRIC KEY GENERATION METHOD  
Asymmetric key generation apparatus generates asymmetric key based on a different key material for each piece of data. The symmetric key generation apparatus is configured to generate a symmetric...
US20090172403 METHOD AND SYSTEM FOR GENERATING AND DISTRIBUTING MOBILE IP SECURITY KEY AFTER REAUTHENTICATION  
A method for generating and distributing MIP security key after Re-Authentication, including: an AAA Server generates an EMSK during a Re-Authentication process; the MS generate a new first MIP...
US20070092075 Image public key generation method  
A method for generating an image public key uses a predefined image as an input to the RSA algorithm to calculate a public key that includes the predefined image information. Translating the...
US20070064934 Parallel cipher operations using a single data pass  
Multiple cipher hardware algorithms are run in parallel over an input stream. For example, one algorithm can process the input stream using an old cipher key while a parallel algorithm processes...
US20140301548 Non-Retained Message System  
A system and method for non-retained electronic messaging is described. In one embodiment, the system includes a message receiver module, a message storing and identifier generation module, a...
US20100166178 METHOD AND SYSTEM FOR SECURING PACKETIZED VOICE TRANSMISSIONS  
An approach is provided for providing secure packetized voice transmissions. A public/private key pair is generated at a call device (or endpoint). An encrypted voice stream is received from...