Match Document Document Title
US20100138653 METHOD AND SYSTEM FOR SEARCHING FOR, AND COLLECTING, ELECTRONICALLY-STORED INFORMATION  
A method and system for searching and collecting electronically stored information are described. Consistent with an embodiment of the invention, configuration and execution of a search are...
US20110208971 Method of Using ECDSA with Winternitz One Time Signature  
A method is provided of authenticating a digitally signed message. A chain of messages is generated. A Winternitz pair of keys is generated for each respective message. A sequence number is...
US20070189526 System and method for secure and flexible key schedule generation  
The present invention is a method for secure and flexible key schedule generation, which includes loading a key schedule algorithm and a cryptographic algorithm into a cryptographic engine. The...
US20120155641 NON-INTERACTIVE VERIFIABLE, DELEGATED COMPUTATION  
A processor on a delegator receives an input upon which an expensive function is to be evaluated. The delegator incorporates the input into a request to perform a task that is different from...
US20090036164 Smart card accessible over a personal area network  
Some embodiments of a smart card accessible over a personal area network have been presented. In one embodiment, an apparatus includes a wireless transceiver to communicatively couple to a...
US20080199007 Identification of a compromised content player  
A system and method for identifying the player that leaked content encryption keys by loading a set of player keys into individual content players and determining the number of encryptions and the...
US20090110191 Techniques For Encrypting Data On Storage Devices Using An Intermediate Key  
A data storage device encrypts data stored in non-volatile memory using a bulk encryption key. The data storage device uses a key derivation function to generate an initial encryption key. The...
US20130034227 SECURE PROVISIONING OF A PORTABLE DEVICE USING A REPRESENTATION OF A KEY  
A portable device initially accesses a secure server and requests a certificate. The secure server generates a random key and encodes the generated key to generate a representation of the key,...
US20110246785 HARDWARE SUPPORTED VIRTUALIZED CRYPTOGRAPHIC SERVICE  
A Trusted Platform Module (TPM) can be utilized to provide hardware-based protection of cryptographic information utilized within a virtual computing environment. A virtualized cryptographic...
US20100077214 Host Device and Method for Protecting Data Stored in a Storage Device  
The owner of proprietor interest is in a better position to control access to the encrypted content in the medium if the encryption-decryption key is stored in the medium itself and substantially...
US20080175391 APPARATUS AND METHOD FOR CRYPTOGRAPHIC PROTECTION OF DIRECTORIES AND FILES  
A computer readable storage medium includes executable instructions to encrypt a file with a file encryption key to produce an encrypted file. The file encryption key is encrypted with a directory...
US20090296940 CONTENT ENCRYPTION USING AT LEAST ONE CONTENT PRE-KEY  
In a method for encrypting content, the content is received in a device and at least a portion of the content is stored to thereby associate the content with one of a first copy control state and...
US20100040235 Key Providing System, Terminal Device, and Information Processing Method  
A terminal device improved with a digraph generation method in a key distribution method of various types of broadcast encryption systems is provided. The terminal device includes an acquiring...
US20060104442 Method and apparatus for receiving broadcast content  
An apparatus for receiving broadcast content is provided. The apparatus includes a receiving unit generating the broadcast content from a broadcast stream received from a content provider via a...
US20080152132 BROADCAST ENCRYPTION METHOD AND BROADCAST DECRYPTION METHOD THEREOF  
A broadcast encryption method and a broadcast decryption method. The broadcast encryption method includes generating a message encryption key using a public key and a secret key generated by using...
US20060023878 Modular multipliers having segmentable structure and cryptography systems utilizing same  
A segmentable modular multiplier circuit includes a control circuit configured to produce a mode control signal and operation control signals in response to a control signal and a calculator...
US20100183152 NETWORK AND METHOD FOR INITIALIZING A TRUST CENTER LINK KEY  
The invention relates in general to a network and to a method for initializing a trust center link key. According to an embodiment of the invention, a network is provided with a new node (106)...
US20090313472 SECURE SESSION KEY GENERATION  
A method and apparatus for securing the interface between a Universal Integrated Circuit Card (UICC) and a Terminal in wireless communications is disclosed. The security of Authentication and Key...
US20120237023 Secure Key Management  
A system for implementing computer security is provided. The system includes a computer processor and an application configured to execute on the computer processor, the application implementing a...
US20100037069 Integrated Cryptographic Security Module for a Network Node  
A system that provides a cryptographic unit that generates secret keys that are not directly accessible to software executed by a controller. The cryptographic unit can include a restrictor...
US20100027784 KEY GENERATION USING BIOMETRIC DATA AND SECRET EXTRACTION CODES  
There is provided a method of generating a key for encrypting Communications between first and second terminals comprising obtaining a measurement of characteristics of a physical identifier of a...
US20090086964 PROVIDING LOCAL STORAGE SERVICE TO APPLICATIONS THAT RUN IN AN APPLICATION EXECUTION ENVIRONMENT  
Methods, systems, and apparatus, including medium-encoded computer program products, for providing local storage service to applications that run in an application execution environment. In one...
US20090116642 METHOD AND DEVICE FOR GENERATING LOCAL INTERFACE KEY  
A method for generating a local interface key includes: generating a variable parameter; and deriving the local interface key, according to the variable parameter generated and related parameters...
US20100254534 METHOD AND APPARATUS FOR ESTABLISHING A KEY AGREEMENT PROTOCOL  
A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a...
US20080069344 METHOD AND APPARATUS FOR KEY AGREEMENT BETWEEN DEVICES USING POLYNOMIAL RING  
Provided is a method of key agreement between devices. Using the method, two devices on a network can exchange information using polynomials of a polynomial ring, authenticate each other using the...
US20120076300 KEY INFORMATION MANAGEMENT METHOD, CONTENT TRANSMISSION METHOD, KEY INFORMATION MANAGEMENT APPARATUS, LICENSE MANAGEMENT APPARATUS, CONTENT TRANSMISSION SYSTEM, AND TERMINAL APPARATUS  
The present invention aims to reliably prevent illegal use of content when the content is encrypted and transmitted with a cipher key. A content transmission method of the present invention...
US20080130879 Method and system for a secure PKI (Public Key Infrastructure) key registration process on mobile environment  
The invention relates to method and system for a secure PKI (Public Key Infrastructure) key registration process in a WPKI (Wireless PKI) environment comprising a registration server and client...
US20100086133 Key Providing System, Key Providing Apparatus, Terminal Device, Key Providing Method, and Key Generation Method  
A key providing apparatus for providing a key used for encryption or decryption of data to a predetermined terminal device is provided. The key providing apparatus includes an acquiring unit for...
US20120140923 METHOD AND SYSTEM FOR ENRYPTION KEY VERSIONING AND KEY ROTATION IN A MULTI-TENANT ENVIRONMENT  
Various techniques and procedures related to encryption key versioning and rotation in a multi-tenant environment are presented here. One approach employs a computer-implemented method of managing...
US20090147950 CRYPTOGRAPHIC DEVICE FOR FAST SESSION SWITCHING  
Provided is a cryptographic device for fast session switching, and more particularly, a cryptographic device using a block cipher algorithm and capable of rapidly performing session switching. The...
US20060153375 Data security in wireless network system  
For data protection in a wireless network system, a frame, including its Medium Address Control (MAC) header and payload, is encrypted with an initialization vector modified at each set state in a...
US20140140504 SYSTEM, DEVICES AND METHODS FOR COLLABORATIVE EXECUTION OF A SOFTWARE APPLICATION COMPRISING AT LEAST ONE ENCRYPTED INSTRUCTION  
Collaborative execution by a first device and a second device of a software application comprising at least one encrypted instruction. The first device obtains a first encrypted instruction;...
US20070206790 Decryption method and apparatus using external device or service and revocation mechanism, and decryption support method and apparatus  
A revocation examination method and apparatus for a device are provided. The method includes: storing information regarding revoked nodes; receiving from the device an identifier (ID) of the...
US20100135498 Efficient Key Derivation for End-To-End Network Security with Traffic Visibility  
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a...
US20110154056 COMPUTER READABLE STORAGE MEDIUM FOR GENERATING AN ACCESS KEY, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE  
A computer readable storage medium having stored therein instructions, which when executed by a computing device cause the computing device to perform a method of generating an access key, the...
US20090310788 METHOD FOR MANAGING AND CONTROLLING THE ACCESS KEYS TO SERVICES IN A COMMUNICATION SYSTEM  
A method for managing keys making it possible for a user to access one or more given services S in a communication system, in which the user is not able to be continuously connected to this...
US20120275595 CRYPTOGRAPHICALLY SECURE AUTHENTICATION DEVICE, SYSTEM AND METHOD  
An electronic device generates identifying values which are used in authenticating the electronic device. The device comprises an interface, a private key generator for generating a private key, a...
US20070030963 Securing and controlling access to digital data  
Techniques for securing and controlling access to digital data are disclosed. A security-code is generated based on a plurality of input received from an input device which does not have to be a...
US20140219442 SECURE CRYPTO KEY GENERATION AND DISTRIBUTION  
This document discusses, among other things, a method of distributing authentication keys that can prevent certain forms of circuit fabrication piracy. In an example, a method can include...
US20120045056 CRYPTOGRAPHIC PROCESSING SYSTEM  
It is aimed to implement a hierarchical predicate encryption (HPE) scheme. A cryptographic process is performed using dual vector spaces (dual distortion vector spaces (DDVS)) of a space V and a...
US20100020977 KEY GENERATION DEVICE, KEY DERIVATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, METHOD AND PROGRAM  
A key generation device (900) receives therein a public key (901) including a hierarchical element (902), a master key (903) including a secret hierarchical element (911), an identity θ (904), and...
US20140177830 Method and system for providing a public key/secret key pair for encrypting and decrypting data  
A method for providing a public key/secret key pair for encrypting and decrypting data, wherein the public key of the public key/secret key pair and a master secret key are generated based on...
US20090198997 System and method for secure electronic communication services  
A system, method and software module for secure electronic communication services, wherein a public key (25) of private-public-key pair (30,25) is associated with an email address (24), internet...
US20060198517 Method and system for asymmetric key security  
Exemplary embodiments disclosed herein may include a method and system for creating pair-wise security keys, comprising receiving an identity key from a website, generating a master key, creating...
US20090097640 DEVICE AND METHOD FOR DETERMINING AN INVERSE OF A VALUE RELATED TO A MODULUS  
A device for determining an inverse of an initial value related to a modulus, comprising a unit configured to process an iterative algorithm in a plurality of iterations, wherein an iteration...
US20130016833 SECURELY USING A DISPLAY TO EXCHANGE INFORMATION  
A first device has a display that is able to show information. The information is to be exchanged with a second device. The information is cleared from the display following receipt of an...
US20100272259 METHOD FOR FILTERING OF ABNORMAL ONT WITH SAME SERIAL NUMBER IN A GPON SYSTEM  
Disclosed is a method of registering only an authorized optical network terminal among a plurality of optical network terminals with the same serial number, in an optical line terminal, using a...
US20110216902 Computation of garbled tables in garbled circuit  
An efficient encryption system for improving the computation speed of a garbled circuit is set forth. The garbled circuit includes a number of garbled Boolean gates having first and second garbled...
US20120331295 METHOD FOR KEY GENERATION, MEMBER AUTHENTICATION, AND COMMUNICATION SECURITY IN DYNAMIC GROUP  
The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps: assigning each member an identification...
US20130223624 ENCRYPTION PROCESSING DEVICE AND ENCRYPTION PROCESSING METHOD  
A transposition processing unit having a k-partition generalized Feistel structure transposes Yb,u into Za,t if Ya,t (t=0, 1, . . . , s−1) is transposed into Zb,u (u=0, 1, . . . , s−1, u≠t), in a...