Match Document Document Title
US20120155646 SUPPORTING DNS SECURITY IN A MULTI-MASTER ENVIRONMENT  
Multiple peer domain name system (DNS) servers are included in a multi-master DNS environment. One of the multiple peer DNS servers is a key master peer DNS server that generates one or more keys...
US20140270160 DIGITAL SIGNATURE AUTHENTICATION WITHOUT A CERTIFICATION AUTHORITY  
Systems and methods for managing private and public encryption keys without the need for a third party certification authority. An initial value is generated by an authentication server. The...
US20100049983 METHOD OF AUTHENTICATING DIGITAL SIGNATURE  
A method of authenticating a digital signature is provided. The method includes sending a request from a first entity to a second entity, at least some of the request being digitally signed with a...
US20140050317 Cloud Key Management System  
This invention uses a cloud-based key management system to store, retrieve, generate, and perform other key operations. The cloud-based system ensures security of the keys while preventing their...
US20120140921 RSA-ANALOGOUS XZ-ELLIPTIC CURVE CRYPTOGRAPHY SYSTEM AND METHOD  
The RSA-analogous XZ-elliptic curve cryptography system and method provides a computerized system and method that allows for the encryption of messages through elliptic polynomial cryptography...
US20110064216 CRYPTOGRAPHIC MESSAGE SIGNATURE METHOD HAVING STRENGTHENED SECURITY, SIGNATURE VERIFICATION METHOD, AND CORRESPONDING DEVICES AND COMPUTER PROGRAM PRODUCTS  
A cryptographic message signature method are provided, which have strengthened security. The method implements two sets of signature algorithms SA1={K1, S1, V1} and SA2={K2, S2, V2}, where Ki, Si...
US20120014521 MOBILE PHONE AIDED OPERATIONS SYSTEM AND METHOD  
The present system and method uses multiple digital devices with possibly different users operating in concert, for performing authentication and other cryptographic operations. The multiple...
US20080285748 Method for generating secret key in computer device and obtaining the encrypting and decrypting key  
The invention relates to a method for generating an secret key in a computer device and using the secret key. The method includes the step of receiving an inputted password first, then processing...
US20090169019 METHOD AND SYSTEMS USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS  
A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate...
US20130177154 METHOD AND SYSTEM FOR DECRYPTING A TRANSPORT STREAM  
A module configured in operation to connect to a host, the module including: a decryptor operable to decrypt an encrypted transport stream received from the host, the transport stream including...
US20150244525 AUTHENTICATION  
A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second...
US20060271785 Method for producing key material  
This invention relates to security procedures in a communication system, specifically to production of key material. The invention provides a method for producing key material in a highly secure...
US20110206201 METHOD OF GENERATING A CRYPTOGRAPHIC KEY, NETWORK AND COMPUTER PROGRAM THEREFOR  
The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D1) and a second...
US20150124962 Fast Computation of a Single Coefficient in an Inverse Polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
US20130315390 Fast Computation Of A Single Coefficient In An Inverse Polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
US20140205092 SECURE PROVISIONING IN AN UNTRUSTED ENVIRONMENT  
Embodiments include methods for securely provisioning copies of an electronic circuit. A first entity (e.g., a chip manufacturer) embeds one or more secret values into copies of the electronic...
US20120039465 Fast Computation Of A Single Coefficient In An Inverse Polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
US20150256339 METHOD FOR ACTIVE CONTENT FINGERPRINTING  
A method of providing robust and secure fingerprints including, at an enrollment stage, the steps of providing a content x for which a fingerprint is to be provided, assigning an ID number to the...
US20110252243 SYSTEM AND METHOD FOR CONTENT PROTECTION BASED ON A COMBINATION OF A USER PIN AND A DEVICE SPECIFIC IDENTIFIER  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a...
US20110197075 ELECTRONIC DEVICE AND POWER ADAPTER THEREOF AND METHOD FOR IDENTIFYING POWER ADAPTER  
An electronic device includes a detection module, an identification code generation module, a decryption module, a comparison module, and a control module. The detection module transmits a...
US20130182838 Method and apparatus for generating a privilege-based key  
Disclosed is a method for generating a privilege-based key using a computer. In the method, a privilege is received from an application, and verified as being associated with the application. The...
US20100017602 Ad-Hoc Trust Establishment Using Visual Verification  
Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on two or more devices and the visual...
US20080075281 ANONYMOUS SELECTABLE CREDENTIAL SYSTEM AND METHOD THEREFOR  
The present invention provides an anonymous selectable credential system and method therefor. In the system, a credential authority issues root credentials to a user for certain user rights. The...
US20120033808 Method and Apparatus for Generating a Public Key in a Manner That Counters Power Analysis Attacks  
A public key for an Elliptic Curve Cryptosystem is generated in a manner that acts as a countermeasure to power analysis attacks. In particular, a known scalar multiplication method is enhanced...
US20130182841 System and Method of Lawful Access to Secure Communications  
The present disclosure relates to systems and methods for secure communications. In some aspects, an initiator KMS receives, from an initiator UE, one or more values used in generation of an...
US20060280300 Cryptographic system  
A cryptographic system is described that comprises a method for the exchange of public keys and the generation of private keys and a message encryption and decryption method via the use of private...
US20140211939 Zero Configuration of Security for Smart Meters  
Techniques for injecting encryption keys into a meter as a part of a manufacturing process are discussed. Since various encryption keys injected into meters may be specific to each individual...
US20130170641 Generator of Chaotic Sequences and Corresponding Generating System  
A generator of chaotic sequences of integer values is provided. The generator includes at least two discrete recursive filters at least of first-order, generating an output chaotic sequence of...
US20120170740 CONTENT PROTECTION APPARATUS AND CONTENT ENCRYPTION AND DECRYPTION APPARATUS USING WHITE-BOX ENCRYPTION TABLE  
A content protection apparatus using a white-box encryption table includes: a random number generation unit for generating a random number; a white-box encryption table for encrypting the random...
US20110320809 METHOD AND APPARATUS FOR KEY REVOCATION IN AN ATTRIBUTE-BASED ENCRYPTION SCHEME  
A method and apparatus for key revocation in an attribute-based encryption scheme is provided herein. Prior to operation, a key management service performs a randomized setup algorithm resulting...
US20110238995 METHODS FOR AUTHENTICATION USING NEAR-FIELD  
Authentication methods are used to authenticate, a device1 having an ESN1 (electronic serial number), a device2 having an ESN2, and/or a user of the devices. In one implementation, device1...
US20090016524 PEER TO PEER IDENTIFIERS  
In an ad hoc peer-to-peer type network during peer discovery, information relating to users of various devices is broadcast to other devices in the network, which can compromise privacy of the...
US20090319802 Key Genaration In An Integrated Circuit  
A method of manufacturing a series of integrated circuits having related functionality, the method including the steps of: (a) determining an identifier; (b) permanently storing the identifier on...
US20120079288 SECURE HOST AUTHENTICATION USING SYMMETRIC KEY CRYTOGRAPHY  
Methods of securely authenticating a host to a storage system are provided. A series of authentication sessions are illustratively performed. Each of the authentication sessions includes the host...
US20140270159 SYSTEM AND METHOD FOR PROVIDING COMPRESSED ENCRYPTION AND DECRYPTION IN HOMOMORPHIC ENCRYPTION BASED ON INTEGERS  
The present invention relates to a technique which provides a function of compressed encryption large pieces of plaintext information in a single ciphertext in order to improve a space efficiency...
US20100316223 Method and Arrangement in a Telecommunication System  
A security key, K_eNB, for protecting RRC/UP traffic between a User Equipment, UE, and a serving eNodeB is established by a method and an arrangement in a Mobility Management Entity, MME, and in...
US20120314856 IMPLICITLY CERTIFIED PUBLIC KEYS  
Methods, systems, and computer programs for using an implicit certificate are described. In some aspects, an implicit certificate is accessed. The implicit certificate is associated with an entity...
US20080250248 Identity Management System with an Untrusted Identity Provider  
This invention describes an Identity Management system, in which the User uses the same set of credentials to log into multiple Web Service Providers (WSPs). However, unlike in traditional...
US20100310077 METHOD FOR GENERATING A KEY PAIR AND TRANSMITTING A PUBLIC KEY OR REQUEST FILE OF A CERTIFICATE IN SECURITY  
A method for generating a key pair and transmitting a public key or request file of a certificate in security is provided. Usually, when a user applies for a certificate, a public-private key pair...
US20100329452 Generation of key streams in wireless communication systems  
Security key stream generation in a communication apparatus. The method includes using a count parameter and a bearer parameter as input, value of said count parameter being incremented as...
US20140133651 ENCRYPTION DEVICE, CIPHER-TEXT COMPARISON SYSTEM, CIPHER-TEXT COMPARISON METHOD, AND CIPHER-TEXT COMPARISON PROGRAM  
An encryption device calculates a derived key by taking a document as a numerical value and corresponding identifier as input values and generates a cipher-text-by-identifier acquired by...
US20110296175 SYSTEMS AND METHODS FOR SOFTWARE LICENSE DISTRIBUTION USING ASYMMETRIC KEY CRYPTOGRAPHY  
Methods and computer readable media for distributing a software license based on asymmetric cryptography via a network. An application publisher generates an asymmetric key-pair having an...
US20100316220 RADIO FREQUENCY IDENTIFICATION SYSTEM AND AUTHENTICATION METHOD THEREOF  
A Radio Frequency Identification (RFID) system and method are provided that includes a reader and a tag which share a predetermined secret key. The reader transmits an authentication request...
US20090147949 UTILIZING CRYPTOGRAPHIC KEYS AND ONLINE SERVICES TO SECURE DEVICES  
The claimed subject matter in accordance with an aspect provides systems and/or methods that generates, allocates, or utilizes strong symmetric cryptographic keys to secure storage devices. The...
US20120250858 APPLICATION USAGE CONTINUUM ACROSS PLATFORMS  
A system for application usage continuum across client devices and platforms includes a first client device configured to execute a first instance of an application and a second client device...
US20130243189 METHOD AND APPARATUS FOR PROVIDING INFORMATION AUTHENTICATION FROM EXTERNAL SENSORS TO SECURE ENVIRONMENTS  
An approach is provided for providing information authentication from external sensors to secure environments. An authentication support platform causes, at least in part, a generation of at least...
US20110051933 PARING METHOD BETWEEN SM AND TP IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM, SET-TOP BOX AND AUTHENTICATION DEVICE USING THIS  
The present invention relates to a technology of paring a secure micro (SM) and a transport processor (TP) in a downloadable conditional access system (DCAS). More specifically, predetermined...
US20130159707 Host Device and Method for Super-Distribution of Content Protected with a Localized Content Encryption Key  
In one embodiment, a host device creates a super-distribution token by encrypting a content encryption key with a super-distribution key and stores the super-distribution token and encrypted...
US20120033807 DEVICE AND USER AUTHENTICATION  
A method of authenticating a device and a user comprises obtaining a device ID for the device, performing a biometric measurement of the user, obtaining helper data for the user, and generating a...
US20090138700 CRYPTOGRAPHIC MANAGEMENT APPARATUS, DECRYPTION MANAGEMENT APPARATUS AND PROGRAM  
A cryptographic management apparatus includes a storage unit which stores cryptographic key information containing a cryptographic key and cryptographic process condition information containing...