Match Document Document Title
US20120207300 Method and Device for Generating Control Words  
The present invention relates to the generation of n control words for encryption of a content item. A device obtains a first key Kstart and a second key Kend; generates the n control words using...
US20080118059 SYSTEM AND METHOD FOR SECURE RECORD PROTOCOL USING SHARED KNOWLEDGE OF MOBILE USER CREDENTIALS  
A method and apparatus for secure record protocol in a system with a server and a client, the method having the steps of: utilizing a mobile user credential as an input to a key generator, the...
US20090180622 METHOD, APPARATUS AND SYSTEM FOR GENERATING AND DISTRIBUTING KEYS BASED ON DIAMETER SERVER  
A method for generating and distributing keys based on the Diameter server in the mobile communication field is disclosed herein. The MN sends the NAR identifier to the PAR; after receiving the...
US20090028342 Systems, Methods, and Media for Adding an Additional Level of Indirection to Title Key Encryption  
Systems, methods and media for encrypting and decrypting content files are disclosed. More particularly, hardware and/or software for adding an additional level of indirection to a title key...
US20110055864 SYSTEMS AND METHODS FOR TRANSCODING AND PLACE SHIFTING MEDIA CONTENT  
A set-top box (STB), digital video recorder (DVR), video player or other host device receives and interacts with a transcode module to provide enhanced transcoding capabilities that may be useful...
US20090323941 SOFTWARE COPY PROTECTION VIA PROTECTED EXECUTION OF APPLICATIONS  
Methods and apparatus to provide a tamper-resistant environment for software are described. In some embodiments, procedures for verifying whether a software container is utilizing protected memory...
US20130177152 Cryptographic Key Spilt Combiner  
A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key...
US20110051929 IMAGE PROCESSING APPARATUS, ELECTRONIC CERTIFICATE CREATION METHOD THEREOF AND RECORDING MEDIUM  
An image processing apparatus includes: a key creator that creates one set of a secret key and a public key for each user; a reader that reads out an electronic certificate to certify a user,...
US20080144819 Efficient Data Integrity Protection  
A message authentication code, MAC, is generated in an electronic circuit, wherein the MAC integrity protects a data value, PD. A random challenge word, RND, is received from a source that is...
US20100037057 SYSTEM AND METHOD FOR USING NETWORKED MOBILE DEVICES IN VEHICLES  
A system and method for using networked mobile devices in a vehicle in a tightly integrated manner is presented. The vehicle has an OBE, a mobile device client, and vehicle components, and the...
US20080072063 Method for generating an encryption key using biometrics authentication and restoring the encryption key and personal authentication system  
A personal authentication system using biometrics information. The system orders, when an characteristic element in the biometrics information (such as a characteristic point in a fingerprint) can...
US20100172503 METHOD OF GENERATING A PUBLIC KEY FOR AN ELECTRONIC DEVICE AND ELECTRNIC DEVICE  
A method for generating a public key for an electronic device is provided, wherein the method comprises generating a public key 103 based on a private key and a unique identifier associated with...
US20100223459 KEY DISTRIBUTION  
Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions...
US20090122991 METHOD AND APPARATUS FOR PROVIDING ENCRYPTED KEY BASED ON DRM TYPE OF HOST DEVICE  
A method and apparatus for providing an encrypted key based on a DRM type of a host device are provided. The method includes receiving available DRM type information of a host device, making a...
US20090193521 ELECTRONIC DEVICE, UPDATE SERVER DEVICE, KEY UPDATE DEVICE  
The present invention offers an electronic device that reduces the amount of data for communication required when files pertaining to software are to be updated, as compared to the conventional...
US20100085075 INTEGRATED CIRCUIT AND METHOD FOR PREVENTING AN UNAUTHORIZED ACCESS TO A DIGITAL VALUE  
An integrated circuit including a digital key provider comprising an output and an enable-input, wherein the digital key provider is configured to provide the digital key at the output only when...
US20140146966 METHOD, SYSTEM AND DEVICE FOR SECURELY TRANSFERRING CONTENT BETWEEN DEVICES WITHIN A NETWORK  
A method is disclosed for securely transferring a content CT between devices within a network managed by a management center. The method includes an activation of the network; a keys recovering...
US20080069343 SECURE TRANSMISSION OF CRYPTOGRAPHIC KEY  
Provided are a method, system and article of manufacture, wherein a cryptographic key generator generates a cryptographic key. The cryptographic key generator encrypts the cryptographic key with a...
US20070071237 Custom static Diffie-Hellman groups  
Methods for choosing groups for a static Diffie-Hellman key agreement protocol to inhibit active attacks by an adversary are provided. In mod p groups, an even h is chosen of value approximately...
US20080226076 PROVIDING A USER DEVICE WITH A SET OF ACCESS CODES  
A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the...
US20090003597 Small Public-Key Based Digital Signatures for Authentication  
Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a...
US20100246819 Method to upgrade content encryption  
Generation of secret keys is carried out in a smartcard for use by a receiver device's main processor, or alternatively, decryption processing for selectively encrypted content is carried out in...
US20080181398 METHODS AND APPARATUS FOR ENHANCING PRIVACY OF OBJECTS ASSOCIATED WITH RADIO-FREQUENCY IDENTIFICATION TAGS  
Encoding radio-frequency identification (RFID) tags, each of the RFID tags having an tag identifier, t, and associated with a corresponding item, in a manner that preserves privacy of information...
US20130101114 APPARATUS AND METHOD FOR GENERATING IDENTIFICATION KEY  
Provided is an apparatus for generating an identification key by a probabilistic determination of a short occurring between nodes constituting a circuit, by violating a design rule provided during...
US20100310070 Generation and Use of a Biometric Key  
In a control system comprising control device adapted for, on the one hand, receiving signal indicating a first biometric datum (W), and, on the other hand, obtaining a second biometric datum...
US20100095121 IMPARTING REAL-TIME PRIORITY-BASED NETWORK COMMUNICATIONS IN AN ENCRYPTED COMMUNICATION SESSION  
This specification describes technologies relating to imparting real-time priority-based network communications in an encrypted session. In general, aspects of the subject matter described can be...
US20080112562 Methods for linking content with license  
A method for accessing content is provided. In this method, a first parameter associated with a license is retrieved. The license is associated with the content. A second parameter associated with...
US20080205653 Method and Mobility Anchor Point for Authenticating Updates from Mobile Node  
A method and Mobility Anchor Point (MAP) are provided for authenticating an update message received at the MAP from a Mobile Node (MN). A table entry is created in the MAP, following receipt of a...
US20100325446 Securing Executable Code Integrity Using Auto-Derivative Key  
A method for protecting software from tampering includes steps for processing, using a computer, first compiled software stored in a computer memory to generate a cryptographic key, the first...
US20100128869 METHOD AND DEVICE FOR EXECUTING A CRYPTOGRAPHIC CALCULATION  
The invention concerns a method which consists in operating a key generation in an electronic component for a specific cryptographic algorithm; storing in the electronic component a prime number P...
US20080219444 Method for the secure loading in a NFC chipset of data allowing access to a service  
A method for the secured loading of data into a first secured host processor of an NFC system comprising an NFC interface circuit for sending and receiving data, enabling a service to be accessed,...
US20140247938 DEVICE FOR GENERATING AN ENCRYPTED KEY AND METHOD FOR PROVIDING AN ENCRYPTED KEY TO A RECEIVER  
A device for generating an encrypted master key. The device comprises at least one input interface configured to receive a receiver identifier, a service provider identifier and a master key for...
US20060133607 Apparatus and method for generating a secret key  
An apparatus comprises a circuit for generating a secret root key having bits representative of threshold voltages, and an error correction module for correcting errors in bits of the secret root...
US20070239994 Bio-metric encryption key generator  
In a method of facilitating an encrypted communication for use in communication between a local device, operated by a user, and a remote device, a data representation of a biometric feature of the...
US20090168999 Method and apparatus for performing cryptographic operations  
In one embodiment, the present invention includes a processor having logic to perform a round of a cryptographic algorithm responsive to first and second round micro-operations to perform the...
US20150023501 Method and Apparatus for Hardware-Accelerated Encryption/Decryption  
An integrated circuit for data encryption/decryption and secure key management is disclosed. The integrated circuit may be used in conjunction with other integrated circuits, processors, and...
US20090208003 Authentication Method, Host Computer and Recording Medium  
According to one embodiment, a host computer updates the media key block MKB in a first updatable memory device in the case where the version number of the media key block MKB read from a...
US20090097641 MANAGEMENT-APPARATUS CARD, MEASURING APPARATUS, HEALTH CARE SYSTEM, AND METHOD FOR COMMUNICATING VITAL SIGN DATA  
The management-apparatus card capable of being attached to a management apparatus receives, from the measuring apparatus, first unique information indicating the measuring apparatus, and...
US20100074440 HIGH-SPEED PIPELINED ARIA ENCRYPTION APPARATUS  
There is provided a high-speed pipelined ARIA encryption apparatus. The high-speed pipelined ARIA encryption apparatus includes a round key generator for generating a plurality of round keys...
US20090310780 BROADCAST RECEIVING APPARATUS AND BROADCAST RECEIVING METHOD  
Before a device key generation procedure is updated in response to execution of revoke, a recorded transport stream is decrypted using an unupdated device key and is stored in a memory unit after...
US20080304659 METHOD AND APPARATUS FOR EXPANSION KEY GENERATION FOR BLOCK CIPHERS  
A key scheduler performs a key-expansion to generate round keys for AES encryption and decryption just-in-time for each AES round. The key scheduler pre-computes slow operations in a current clock...
US20080095360 Signature System and Signature Method  
A signature system in which size of data to be transmitted is small and data can be processed efficiently in a Merkle signature system having high security. A processing part 112 of a smartcard...
US20120140922 Method for Generating Private Keys in Wireless Networks  
The first and second nodes in a wireless network estimate first and second channel response. The first node quantizes the first channel response to produce a first bit sequence, and a feed-forward...
US20140145353 TAMPER-RESISTANT COATING FOR AN INTEGRATED CIRCUIT  
A system may include an integrated circuit and a coating at least partially encapsulating the integrated circuit. The coating may include an electrically insulating material at least partially...
US20090046853 Method and system for generating a pair of public key and secret key  
A method of generating a pair of public key and secret key, includes the steps of selecting a public key; selecting a secret key; computing a heavy prime number in responsive to the public key and...
US20100042844 METHOD, BASE STATION, RELAY STATION AND RELAY COMMUNICATION SYSTEM FOR IMPLEMENTING MESSAGE AUTHENTICATION  
A method for implementing message authentication is provided. The method includes the following steps. A path by which a destination address of a message to be sent can be reached is determined. A...
US20080304658 Wireless Communication Apparatus and Wireless Communication Method  
An inventive wireless communication apparatus that, in a wireless communication system to which a secret key scheme is applied, can generate a secret key, which is different from a secret key...
US20130108046 ESTABLISHING SECURE COMMUNICATION BETWEEN AN IMPLANTABLE MEDICAL DEVICE AND AN EXTERNAL DEVICE  
Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device, biological data; utilizing the biological...
US20080137857 Systems and methods for distributing and securing data  
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and...
US20090168998 EXECUTING AN ENCRYPTION INSTRUCTION USING STORED ROUND KEYS  
Embodiments of an invention for executing an encryption instruction using stored round keys are disclosed. In one embodiment, an apparatus includes instruction logic, encryption logic, a storage...