AcclaimIP-ad

Match Document Document Title
US20100275028 VERIFICATION APPARATUS  
In an integer partitioning process S701, an integer partitioning unit 110 inputs an order p of a finite group G and an integer e, and calculates an integer e1 and an integer e2 that satisfy...
US20100088519 CLIENT DEVICE, KEY DEVICE, SERVICE PROVIDING APPARATUS, USER AUTHENTICATION SYSTEM, USER AUTHENTICATION METHOD, PROGRAM, AND RECORDING MEDIUM  
In a user authentication system according to the present invention, at user registration, a client device obtains a signature for a user ID, a password, and a public key by using a private key...
US20090217033 Short Authentication Procedure In Wireless Data Communications Networks  
In a wireless communications network including at least one authenticator and at least one authentication server, wherein the authenticator is adapted to interact with the authentication server...
US20090046854 Method for a Public-Key Infrastructure Providing Communication Integrity and Anonymity While Detecting Malicious Communication  
An inventive scheme for detecting parties responsible for repeated malicious activities in secure and anonymous communication is presented. The scheme comprises generating a pool of keys,...
US20050010774 Apparatus and method for a secure broadcast system  
Apparatus and method for provisioning an access key used for a controlled access broadcast service is disclosed. In one aspect, a method for secure processing in a device that securely stores a...
US20130028415 CRYPTOGRAPHIC PROCESSING SYSTEM, KEY GENERATION DEVICE, ENCRYPTION DEVICE, DECRYPTION DEVICE, SIGNATURE PROCESSING SYSTEM, SIGNATURE DEVICE, AND VERIFICATION DEVICE  
The object is to provide a secure functional encryption scheme having a large number of cryptographic functions. An access structure is constituted by applying the inner-product of attribute...
US20100218001 Method for Managing Keys and/or Rights Objects  
One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an...
US20130064366 Method for Generating Cryptographic Half-Keys, and Associated System  
A method for generating cryptographic half-keys makes it possible to generate n pairs (Ki1, Ki2), 1≦i≦n, of cryptographic half-keys, each of said pairs making it possible to reconstruct an access...
US20090257619 Method for Extracting Random Signatures From a Material Element and Method for Generating a Decomposition Base to Implement the Extraction Method  
The present invention concerns a method for extracting a random signature from a subject material element, comprising: a phase to generate at least one acquisition vector of structural...
US20150263857 DYNAMIC SEED AND KEY GENERATION FROM BIOMETRIC INDICIA  
A system, a method, and a computer program for generating a seed and/or a key from live biometric indicia, such that all the information necessary for generating the seed and/or the key is not...
US20060215837 Method and apparatus for generating an identifier-based public/private key pair  
An identifier-based public/private key pair is generated for a first party with the involvement of a trusted authority that has an associated secret. An identifier of the first party is signed by...
US20110188651 KEY ROTATION FOR ENCRYPTED STORAGE MEDIA USING A MIRRORED VOLUME REVIVE OPERATION  
Encryption key rotation is performed in computing environments having mirrored volumes by initializing a target storage media with a new key, performing a mirror revive operation from a first...
US20090060189 TERMINAL DEVICE, GROUP MANAGEMENT SERVER, NETWORK COMMUNICATION SYSTEM, AND METHOD FOR GENERATING ENCRYPTION KEY  
A network communication system has terminal devices belonging to a group, the terminal devices generating, if there is a leaving terminal device leaving from the group, an updated group encryption...
US20090202069 METHOD AND SYSTEM FOR GENERATING A SECURE KEY  
A method, system on a chip, and computer system for generating more robust keys which utilize data occupying relatively small die areas is disclosed. Embodiments provide a convenient and effective...
US20090257585 ORGANIC KEYED ENCRYPTION  
An encryption technique that creates a unique encryption key or fingerprint based on unique physical and electrical characteristics of a target electronic assembly to be protected. The encryption...
US20090016525 ENCODING/DECODING APPARATUS  
An encoding/decoding apparatus comprises a central processing unit and an encryption/decryption accelerator coupled to the central processing unit. The accelerator comprises an input for input...
US20070053520 Method and apparatus for establishing a communication key between a first communication partner and a second communication partner using a third party  
For establishing a communication key (KB) for a communication between a first communication partner (13) and a second communication partner (12), a third party (15) is used. After establishing a...
US20090028340 Tunable compact entangled-photon source and QKD system using same  
A robust, quickly tunable narrow-linewidth entangled photon source system based on Spontaneous Parametric Down Conversion (SPDC) of the pump light in periodically polled LiNbO3 (PPLN) waveguides....
US20130287208 SYSTEMS AND METHODS FOR CONTROLLING FILE EXECUTION FOR INDUSTRIAL CONTROL SYSTEMS  
A system includes a build system processor configured to generate a private encryption key and configured to add the private encryption key to at least one of a plurality of source files. Each of...
US20120201377 Authenticated Mode Control  
Methods and systems for authenticated mode control in controlled devices are disclosed. A method for changing a mode in a controlled device from a current mode includes selecting one of several...
US20080195864 Method for implementing DRM function and additional function using DRM device and system thereof  
A digital rights management (DRM) function performing method and system using a DRM device are provided, in which a DRM device connected to a second communication device decodes encoded contents...
US20150063566 ENCRYPTION USING REAL-WORLD OBJECTS  
Technologies are generally described for providing an encryption method using real-world objects. In some examples, a method may include capturing, by a first electronic device, an external...
US20120300923 ENCRYPTION USING REAL-WORLD OBJECTS  
Technologies are generally described for providing an encryption method using real-world objects. In some examples, a method may include capturing, by a first electronic device, an external...
US20100020964 KEY GENERATION METHOD USING QUADRATIC-HYPERBOLIC CURVE GROUP  
Disclosed is a key generation apparatus which uses a finite commutative group defined by a number-theoretical (or arithmetical) function that can be substituted for the elliptic curve, thereby...
US20140003602 Flexible Architecture and Instruction for Advanced Encryption Standard (AES)  
A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also...
US20110182427 ESTABLISHING, AT LEAST IN PART, SECURE COMMUNICATION CHANNEL BETWEEN NODES SO AS TO PERMIT INSPECTION, AT LEAST IN PART, OF ENCRYPTED COMMUNICATION CARRIED OUT, AT LEAST IN PART, BETWEEN THE NODES  
An embodiment may include circuitry to establish, at least in part, a secure communication channel between, at least in part, a client in a first domain and a server in a second domain. The...
US20150146869 ELECTRONIC CIRCUIT, ELECTRONIC APPARATUS, AND AUTHENTICATION SYSTEM  
An electronic circuit includes: a plurality of RS latch circuits each configured to enter a metastable state in accordance with a clock signal input to the RS latch circuit; a determination...
US20090279697 CIPHERTEXT KEY CHAINING  
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a current key is generated from a prior ciphertext block and another key,...
US20100250919 METHODS AND SYSTEMS FOR SECURE DISTRIBUTION OF SUBSCRIPTION-BASED GAME SOFTWARE  
A method for secure communications. At least one encryption key can be generated based on a pass-phrase that associates a unique identifier of a client system with a customer. Customer data...
US20080162937 Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN)  
A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are set in key exchange mode. The at...
US20100054463 COMMUNICATION SYSTEM AND METHOD FOR PROTECTING MESSAGES BETWEEN TWO MOBILE PHONES  
A communication system and method for protecting messages between two mobile phones are provided. The method sets protective parameters in a first mobile phone, generates an encryption key and a...
US20100005317 Securing temporary data stored in non-volatile memory using volatile memory  
Temporary digital data received for storage in non-volatile memory are encoded using a key stored in volatile memory. The encoded digital data are then stored in the non-volatile memory. As long...
US20090319799 GENERATING UNIQUE DATA FROM ELECTRONIC DEVICES  
Providing for analysis of artifacts of electronic devices to generate data that is substantially unique to a particular device or to a class of devices is described herein. In some aspects,...
US20090319769 DISCRETE KEY GENERATION METHOD AND APPARATUS  
A computer enabled secure method and apparatus for generating a cryptographic key, to be used in a subsequent cryptographic process, where the key is to be valid only for example during a...
US20090129590 COMMON KEY GENERATION SYSTEM, COMMON KEY GENERATION METHOD AND NODE USING THE SAME  
First and second nodes generate numeric string elements from time interval by their physical changes. The first node generates a basic numeric string from the numeric string elements and similar...
US20080037776 Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus  
A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold...
US20070230692 KEY GENERATING APPARATUS, PROGRAM, AND METHOD  
A key generating apparatus generates a fibration X(x, y, t)=0 of an algebraic surface X serving as a part of a public key and defined on a finite field Fq (where q=pr [p is a prime number and r is...
US20080165966 Information Recording/Reproducing Device  
[PROBLEM] To provide an information recording/reproducing apparatus, an information recording/reproducing method, an information recording/reproducing program and a record medium, secure contents...
US20070297607 Video distribution system  
A video distribution system that distributes encrypted video data, using improved encryption keys. A master content key is set as the highest-order key. One or more elements (unique camera ID,...
US20080298590 NETWORK ENCRYPTION KEY ROTATION  
Systems and methods for authenticating key rotation communications. Key rotation communications can include a key counter known to both a headend device and a station. Comparison between a local...
US20080130878 Method for generating, operating, and using a sparse w-NAF key for encryption  
A method for generating, operating, and using a sparse w-NAF key for encryption is disclosed. The method for generating a key comprises generating a string of a number of coefficients, in which at...
US20050008152 Methods and apparatus for providing secure two-party public key cryptosystem  
Techniques for an efficient and provably secure protocol by which two parties, each holding a share of a Cramer-Shoup private key, can jointly decrypt a ciphertext, but such that neither party can...
US20120069996 SYSTEM AND METHOD FOR ENCRYPTING TRAFFIC ON A NETWORK  
According to embodiments of the present invention a system and method for encrypting traffic on a network is disclosed. Encrypted data is transmitted between a first network element and a second...
US20100058050 DATA KEEPING METHOD, CLIENT APPARATUS, STORAGE DEVICE, AND PROGRAM  
A storage device sends its storage-device-specific information A to a client apparatus. The client apparatus generates an encryption key P1, using client-apparatus key generation information B1...
US20090113213 SYSTEM AND METHOD FOR SEARCHING ENCRYPTED NUMERICAL DATA  
A system for searching encrypted numerical data according to an embodiment of the present invention includes: a key generator that generates a key for encryption; an index generator that generates...
US20130251145 QUANTUM KEY DISTRIBUTION  
Methods and apparatus for quantum key distribution are described, in particular including methods and networks 300 arranged to improve and/or ensure the security of data transmitted thereby by (i)...
US20070058808 Method and system for deriving an encryption key using joint randomness not shared by others  
The present invention is related to a method and system for deriving an encryption key using joint randomness not shared by others (JRNSO). Communicating entities generate JRNSO bits from a...
US20140301549 PROCESS FOR SELECTING COMPRESSED KEY BITS FOR COLLISION RESOLUTION IN HASH LOOKUP TABLE  
A method and network element identify a set of bit indices for forming compressed keys, which are used to map a set of keys of corresponding input values to assigned lookup values in a hash table,...
US20090285390 INTEGRATED CIRCUIT WITH SECURED SOFTWARE IMAGE AND METHOD THEREFOR  
The various embodiments herein disclosed include a method wherein an integrated circuit (100) may receive a code image from an external device (127), encrypt the code image using a cryptographic...
US20100095110 OUT OF BAND ENCRYPTION  
Embodiments of the invention relate to systems and methods for securing data transmission in networks. Embodiments of the invention further relate to encryption methods that dynamically adjust...