Match Document Document Title
US20100008506 METHOD AND APPARATUS FOR PERFORMING VOIP-BASED COMMUNICATION USING BIO KEYS  
A method for performing an encrypted voice call between a first terminal and a second terminal supporting a Voice over Internet Protocol (VoIP)-based voice call. In the method, the first and...
US20080154782 APPARATUS, METHOD AND SYSTEM FOR PROTECTING PERSONAL INFORMATION  
A method, apparatus, and system for protecting personal information are provided. The personal-information-protecting apparatus is a device for protecting personal information using a pseudonym,...
US20060192651 Data transmit system and transmit methods by using n-dimensional information  
The present invention relates to a system and method of transmitting information using a one-time encryption algorithm based on N-dimension information, as in transmitting data between a client...
US20060239452 Apparatus and method for providing security service  
An apparatus for providing a security service includes a key generation unit which generates a pair of keys including a first temporary public key and a first temporary private key for a network...
US20100254533 SIMPLIFIED SECURE SYMMETRICAL KEY MANAGEMENT  
Nodes of a network are each provided with a seed value and a seed identifier. Each seed value has a corresponding unique seed identifier which is maintained within the system. Within each...
US20100169650 STORAGE MINIMIZATION TECHNIQUE FOR DIRECT ANONYMOUS ATTESTATION KEYS  
A storage minimization technique for direct anonymous attestation (DAA) keys is presented. In one embodiment, the method includes deriving a random portion of a (DAA) private key from a device's...
US20150023497 APPARATUS AND METHOD FOR KEY UPDATE FOR USE IN A BLOCK CIPHER ALGORITHM  
A method herein is for encryption key update in a station. In the method, a first data block is encrypted using a first plurality of round keys over a first plurality of rounds to generate a first...
US20100014662 METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PROVIDING TRUSTED STORAGE OF TEMPORARY SUBSCRIBER DATA  
A method for providing trusted storage of temporary subscriber data may include receiving a value indicative of a temporary identity associated with a device, encrypting the value with a randomly...
US20100098253 Broadcast Identity-Based Encryption  
A public key (PK) dependent on a secret key is accessible to a sender entity (2) and to recipient entities. A private key that can be associated with a recipient entity depends on the secret key...
US20080136640 METHOD AND SYSTEM FOR CONTROLLING DISTANT EQUIPMENT  
A method and system for controlling distant equipment. A passive radio frequency identification (RFID) tag within a Programmable Secure Remote Controller (PSRC) receives a radio frequency (RF)...
US20100080387 PORTABLE MEMORY AND A METHOD FOR ENCRYPTING THE SAME  
The present invention provides a portable memory, comprising: a key storage unit for storing a register key for the portable memory; a key receiving unit for receiving a first key entered by a...
US20150016605 UNIQUE SURROGATE KEY GENERATION USING CRYPTOGRAPHIC HASHING  
The present invention relates to a method or system of generating a surrogate key using cryptographic hashing. One embodiment of the method of the present invention may have steps such as...
US20130114809 UNIQUE SURROGATE KEY GENERATION USING CRYPTOGRAPHIC HASHING  
The present invention relates to a method or system of generating a surrogate key using cryptographic hashing. One embodiment of the method of the present invention may have steps such as...
US20110123021 SURROGATE KEY GENERATION USING CRYPTOGRAPHIC HASHING  
The present invention relates to a method or system of generating a surrogate key using cryptographic hashing. One embodiment of the method of the present invention may have steps such as...
US20100111308 KEY HANDLING IN COMMUNICATION SYSTEMS  
In a method for key handling in mobile communication systems, first and second numbers are exchanged between entities of the mobile communication system. The first and second numbers are...
US20100119063 Establishing Relative Identity  
There are disclosed a method, computing device, and storage medium for establishing relative identity between a first agent on a first computing device and a second agent on a second computing...
US20080307228 WEDI: AN ENCRYPTION-BASED METHOD AND SYSTEM FOR THE IDENTIFICATION AND PROTECTION OF PRINTED DOCUMENTS OR THOSE BEING TRANSMITTED BY ELECTRONIC MEANS  
WEDI it is both a method and a system that uses symmetric and asymmetric encryption algorithms which makes feasible the identification of printed documents or those being transmitted by electronic...
US20100268937 KEY MANAGEMENT FOR SECURE COMMUNICATION  
A method and arrangement is disclosed for managing session keys for secure communication between a first and at least a second user device in a communications network. The method is characterized...
US20100205648 Secure Integrated Media Center  
A set-top media system is disclosed which can be combined with an open architecture personal computer (PC) to provide a feature-rich secure integrated media center while meeting security rules of...
US20090185681 CIRCUIT ARRANGEMENT AND METHOD FOR RSA KEY GENERATION  
In order to further develop a circuit arrangement for as well as a method of performing at least one operation, in particular at least one cryptographic calculation, wherein the problem of...
US20100211790 AUTHENTICATION  
The present invention relates to at least a method of authenticating a user in a communication network including contacting an authentication entity in a first authentication of a user seeking...
US20100131756 USERNAME BASED AUTHENTICATION AND KEY GENERATION  
An apparatus and a method for an authentication protocol. A client generates a server unique identifier of a server prior to communicating with the server. An encrypted password generator module...
US20120027206 INFORMATION GENERATION APPARATUS,METHOD, PROGRAM, AND RECORDING MEDIUM THEREFOR  
Hierarchical cryptography expressed in a general semiordered structure other than a tree structure is implemented. In information generation, random numbers σv and (σvj)jεw(v)εZq are generated;...
US20090063859 CONTENT DISTRIBUTION SERVER AND CONTENT DISTRIBUTION SYSTEM USING THE SAME  
The present invention relates to a content distribution server or the like, capable of more surely preventing an unauthorized use of a content. Content distribution servers 2 and 3 are arranged to...
US20090028341 COMMUNICATION SYSTEM, COMMUNICATION DEVICE AND PROCESSING METHOD THEREFOR  
A master generates a session key, receives public keys from a plurality of slaves, encrypts the session key using the individual public keys, transmits the encrypted session key to the plurality...
US20080292102 QUANTUM KEY DISTRIBUTION SYSTEM AND METHOD  
A method and system for transmitting optical clock signals and quantum key signals on a single optical channel, and for reducing quantum bit error rate in a quantum key distribution system. The...
US20080037791 Method and apparatus for evaluating actions performed on a client device  
Disclosed is a method and apparatus for evaluating actions performed on a client device. For each of the performed actions, a current key is generated from a previous key and an associated action...
US20050111660 Transmitting apparatus and method, receiving apparatus and method, and transmitting and receiving system and method  
A PC is authenticated by a server (SEQ100). When a monitoring start request is issued (SEQ101), an in-house security unit generates a one-time key (SEQ106). The one-time key and information ex. a...
US20140198913 Method and Apparatus for a Computable, Large, Variable and Secure Substitution Box  
One feature pertains to methods for generating cryptographic values associated with substitution boxes (S-box). The methods includes first obtaining an input value and a first value. One method...
US20100034383 SYSTEM AND METHOD FOR ENCRYPTING TRAFFIC ON A NETWORK  
According to embodiments of the present invention a system and method for encrypting traffic on a network is disclosed. Encrypted data is transmitted between a first network element and a second...
US20050271204 Standalone hardware accelerator for advanced encryption standard (AES) encryption and decryption  
Systems and methods for accelerating AES encryption and decryption operations are provided. Aspects of the method may include time multiplexing a plurality of substitution boxes (S-boxes) for...
US20060133608 Shrinking key generator for parallel process  
A parallel processing shrinking key generator is provided. The parallel processing shrinking key generator includes: a selection linear feedback shift register (LFSR); a source LFSR; a selection...
US20080107262 Method and apparatus for centrally managed encrypted partition  
A method and apparatus for protecting a remote computer connected through a network to a main computer, by creating a cryptokey on the main computer, supplying the cryptokey to the remote computer...
US20100074438 SYSTEMS AND METHODS FOR KEY MANAGEMENT  
A method for key management for a broadcasting system includes generating a receiver group key (RGK) seed and a plurality of parameters for a receiver group provided by the broadcasting system;...
US20110038478 Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus  
A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold...
US20090300351 FAST SEARCHABLE ENCRYPTION METHOD  
The present invention provides a method, apparatus and system for fast searchable encryption. The data owner encrypts files and stores the ciphertext to the server. The data owner generates an...
US20080077795 Method and apparatus for two-way authentication without nonces  
A method and logical apparatus for accomplishing the two-way authentication of two parties without the use of nonce values. In the prior art, authentication may be accomplished both through the...
US20100061551 ENCRYPTION/DECRYPTION APPARATUS AND METHOD USING AES RIJNDAEL ALGORITHM  
An encryption/decryption apparatus and method using an advanced encryption standard (AES) Rijndael algorithm are provided. The apparatus includes a round key operator that performs arithmetic...
US20130188790 CRYPTOGRAPHIC KEY  
A technique to facilitate cryptographic key management is provided. In one aspect, multiple strings or components are sorted and concatenated in the order in which they were sorted.
US20150188705 CRYPTOGRAPHIC KEY GENERATION USING A STORED INPUT VALUE AND A STORED COUNT VALUE  
Embodiments of an invention for cryptographic key generation using a stored input value and a stored count value have been described. In one embodiment, a processor includes non-volatile storage...
US20100329455 Cryptographic key generation using a stored input value and a stored count value  
Embodiments of an invention for cryptographic key generation using a stored input value and a stored count value have been described. In one embodiment, a processor includes non-volatile storage...
US20070258585 MULTIFACTOR SPLIT ASYMMETRIC CRYPTO-KEY WITH PERSISTENT KEY SECURITY  
A processor generates an asymmetric crypto-key, such as an RSA crypto-key, which is associated with the user and includes a private key and a public key. It computes a first key portion based on a...
US20100199092 SENSOR DERIVED AUTHENTICATION FOR ESTABLISHING PEER-TO-PEER NETWORKS  
Methods, systems and devices for generating an authentication key are provided. Two or more communications devices can generate an authentication key by monitoring a physical stimulus that is...
US20100014666 Method and Apparatus for Protecting Scalable Video Coding Contents  
Disclosed are a method and apparatus capable of reducing the computational complexity of encryption and decryption by encrypting only data of scalable video coding contents for each coding layer...
US20090217035 Bilaterally Generated Encryption Key System  
Bilaterally Generated Encryption Key System is a variable password based computationally non intensive symmetric encryption key system dispensing with memorization and exchange of keys, capable of...
US20090052675 SECURE REMOTE SUPPORT AUTOMATION PROCESS  
Secure Remote Support Automation Process wherein a remote support server receives a support task request and schedules a predefined task to a predefined actor who also has a predefined escalation...
US20100020968 Protection Scheme for AACS Keys  
A method for protecting a software video player having Advanced Access Content System (AACS) includes reading segments of an encrypted first key from noncontiguous regions of memory, assembling...
US20150098565 PRIVACY ENHANCED SPATIAL ANALYTICS  
Method, system, and computer program products, implementing and using techniques for processing data representing observations of entities. An anonymized key is generated. The anonymized key...
US20130322620 APPARATUS AND METHOD FOR GENERATING SECRET KEY FOR ID-BASED ENCRYPTION SYSTEM AND RECORDING MEDIUM HAVING PROGRAM RECORDED THEREON FOR CAUSING COMPUTER TO EXECUTE THE METHOD  
A private key generation apparatus for generating a private key corresponding to a user ID using the user ID as a public key is disclosed. When a user ID is input, an ID conversion unit outputs a...
US20080235522 CONTENT PLAYBACK METHOD AND RECORDING AND PLAYBACK DEVICE  
Where a follow-up playback is realized for content data that is recorded by changing an encryption key at predetermined intervals for copyright protection, fast feed and playback operations are...