Match Document Document Title
US20050117747 SECURE DIGITAL CONTENT TRADING SYSTEMS AND METHODS  
Systems and methods for securely performing digital commerce. A user device provides a first key and a random number to a server over a first network, encrypts the random number and a user...
US20110280397 Method and System for Secret Key Exchange Using Wireless Link Characteristics and Random Device Movement  
A new methodology to exchange a random secret key between two parties. The diverse physical characteristics of the wireless medium and device mobility are exploited for secure key exchange. Unique...
US20110222686 METHOD FOR ISSUING IC CARD STORING ENCRYPTION KEY INFORMATION  
It is possible to issue an. IC card storing unique encryption key information in such a manner that re-issuing is enabled and sufficient security can be assured. An IC card provider X delivers an...
US20120155635 ATTRIBUTE BASED ENCRYPTION USING LATTICES  
A master public key is generated as a first set of lattices based on a set of attributes, along with a random vector. A master secret key is generated as a set of trap door lattices corresponding...
US20100043080 Methods and Systems Involving Survey Administration  
A method includes authorizing a user to participate in a survey, generating a key associated with a user identifier and a survey identifier, sending the key to a user terminal, directing the user...
US20100306530 WORKGROUP KEY WRAPPING FOR COMMUNITY OF INTEREST MEMBERSHIP AUTHENTICATION  
Methods and systems for managing a community of interest are disclosed. One method includes creating a workgroup key associated with a community of interest, and protecting one or more resources...
US20110167268 NETWORK DEVICE AUTHENTICATION  
In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network...
US20140211938 MODIFIED ELLIPTIC CURVE SIGNATURE ALGORITHM FOR MESSAGE RECOVERY  
A modified Chinese State Encryption Management Bureau's SM2 Elliptic Curve Signature Algorithm that offers partial message recovery and lowers the signature size for a given cryptographic...
US20110093883 SYSTEM, PROTECTION METHOD AND SERVER FOR IMPLEMENTING THE VIRTUAL CHANNEL SERVICE  
A system for implementing the virtual channel service generates an content key associated with each of the video on-demand (VOD) program contents for the each VOD program content multicast on a...
US20080155669 MULTIPLE ACCOUNT AUTHENTICATION  
A method and a system allow accessing several of a user's controlled access accounts by presenting the credentials of only one of the accounts. The method may include (a) storing the credentials...
US20120027205 IDENTITY AUTHENTICATION AND SHARED KEY GENERATION METHOD  
The invention relates to an identity authentication and key negotiation method. In order to overcome the defects in the prior art that security of authentication methods is not high, the invention...
US20080095375 Secret information management apparatus and secret information management system  
In a secret information management system, a secret information management apparatus comprises a secret distribution unit which secretly distributes a data key k using a (k, n) threshold secret...
US20120300924 Implicit Certificate Scheme  
A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. The trusted entity selects a unique identity...
US20110191585 Device Authentication  
Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of...
US20100329465 METHOD OF TRIGGERING A KEY DELIVERY FROM A MESH KEY DISTRIBUTOR  
A mesh station applying for access to a network includes a list of peer stations in messages of an authenticated key establishment protocol. A mesh key distributor derives a key delivery key and...
US20060072747 Enhancing entropy in pseudo-random number generators using remote sources  
A system, apparatus, and method are provided for enhancing entropy in a pseudo-random number generator (PRNG) using remote sources. According to one embodiment of the present invention, first, the...
US20090208002 PREVENTING REPLAY ATTACKS IN ENCRYPTED FILE SYSTEMS  
Replay attacks in an encrypted file system are prevented by generating a session key and providing the session key to one or more drive managers and an encrypted file system process. When a drive...
US20100002883 SECURITY PROCEDURE AND APPARATUS FOR HANDOVER IN A 3GPP LONG TERM EVOLUTION SYSTEM  
A method and apparatus for implementing a security procedure during handover of a wireless transmit/receive unit (WTRU) in wireless communications that controls the behavior of a handover target...
US20080095361 Security-Enhanced Key Exchange  
A unique identifier of a remote device is not sent in clear text on a local interlace between the remote device and a device that can communicate with a wireless network, but a procedure for...
US20140233740 Secure Distribution of Content  
Methods and systems are described for secure delivery of a content item from at least a first content distribution network (CDN1) to at least one content receiving entity using a split-key...
US20130301828 METHOD FOR ESTABLISHING A SECURE COMMUNICATION CHANNEL  
The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote server (S) exchanging data through...
US20130039488 Device and method for providing portable and secure internet-based IT services  
The increase in popularity of Internet-based computing services for delivery of their information technology (IT) capability has also created dependences for the user to access their IT facilities...
US20110016307 Authorization, authentication and accounting protocols in multicast content distribution networks  
An end user computer is assigned a multicast content distribution group by a network service intelligence platform. The network service intelligence platform authenticates a token sent by the user...
US20130322622 AUTHENTICATION METHODS AND APPARATUS USING BASE POINTS ON AN ELLIPTIC CURVE AND OTHER TECHNIQUES  
In one aspect, a method comprises the steps of deriving a base point on an elliptic curve in a first processing device, generating authentication information in the first processing device...
US20110087883 SELF-SIGNED IMPLICIT CERTIFICATES  
There are disclosed systems and methods for creating a self-signed implicit certificate. In one embodiment, the self-signed implicit certificate is generated and operated upon using...
US20080192929 Secure communication unit  
A vehicle having electrical or electronic components connected to a communication network also has a security unit connected to the network. This security unit in turn has at least one...
US20140133650 License Administration Device and License Administration Method  
A license administration device manages grant or denial of each optional function in a plurality of licensee devices. The licensee device stores key information encrypted with a cipher key so as...
US20130287207 MULTIPLE HASHING IN A CRYPTOGRAPHIC SCHEME  
Methods, systems, and computer programs for producing hash values are disclosed. A first hash value is obtained by applying a first hash function to a first input. The first input can be based on...
US20100322416 SYSTEM, APPARATUS AND METHOD FOR LICENSE KEY PERMUTATION  
A system and method of dynamically altering the encoding, structure or other attribute of a cryptographic key, typically a license activation key, to render useless keys that have been created by...
US20080162930 APPARATUS, METHODS, AND SYSTEM FOR ROLE-BASED ACCESS IN AN INTELLIGENT ELECTRONIC DEVICE  
The present disclosure describes apparatus, methods, and system for secure access control of an intelligent electronic device (“IED”) by multiple personnel. Within the IED a set of basic...
US20120257746 Systems and Methods to Securely Generate Shared Keys  
A method for secure bidirectional communication between two systems is described. A first key pair and a second key pair are generated, the latter including a second public key that is generated...
US20080263359 Water mark embedding and extraction  
A watermarking key consisting of a sequence of elements is embedded into a data sequence. Each element may take on two or more values. In order to embed a watermarking key, first a reference...
US20150098566 CRYPTOGRAPHIC SYSTEM, CRYPTOGRAPHIC METHOD, CRYPTOGRAPHIC PROGRAM, AND DECRYPTION DEVICE  
In a functional encryption scheme where a decryption key dk can decrypt a ciphertext encrypted by an encryption key ek, when decrypting the encryption key in which a parameter Φ is set, by the...
US20100161966 MUTUAL AUTHENTICATION APPARATUS AND METHOD IN DOWNLOADABLE CONDITIONAL ACCESS SYSTEM  
A mutual authentication method in a Downloadable Conditional Access System (DCAS) is provided. The mutual authentication method may receive authentication-related information about authentication...
US20120144197 POINT-TO-POINT COMMUNICATION METHOD IN A WIRELESS SENSOR NETWORK AND METHODS OF DRIVING COORDINATORS AND COMMUNICATION DEVICES IN THE WIRELESS SENSOR NETWORK  
The present invention relates to a point-to-point communication method that performs mutual authentication and creates link keys without using a master key. The point-to-point communication method...
US20090316888 PLAYING METHOD AND DEVICE OF DIGITAL RIGHT MANAGING MULTIMEDIA  
A playing method of digital right managing multimedia is disclosed, in which the files of DRM multimedia to be played take a Page as a playing basic unit, when the operation of...
US20120294440 Key Agreement and Re-keying over a Bidirectional Communication Path  
A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key...
US20120063599 Key Agreement and Re-keying over a Bidirectional Communication Path  
A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key...
US20110010551 SHARED ENCRYPTION KEY GENERATION VIA ACCELEROMETER DIGITIZATION  
An apparatus and method for generating a shared secret between at least two wireless portable electronic devices. A shared secret is generated by holding together the at least two devices and...
US20080095359 Security System for Wireless Networks  
The invention relates to a device (21) for managing guest key records (6) in wireless home networks (1), comprising at least one interface (211) for connecting a guest key transmitter (GKT) (5), a...
US20120308002 DEVICE ARCHIVING OF PAST CLUSTER BINDING INFORMATION ON A BROADCAST ENCRYPTION-BASED NETWORK  
Provided are techniques for the creation and storage of an archive for binding IDs corresponding to a cluster of devices that render content protected by a broadcast encryption scheme. When two or...
US20060222175 Computation method, computing device and computer program  
The computing device calculates an equivalence H0≡2m*k+1 (mod n) relating to a divisor n of 2m*k+1 (step A), computes an equivalence H≡2E(p, m, k) (mod n) of 2E(p, m, k) (mod n) from H0 by an REDC...
US20130223623 PORTABLE SECURE ELEMENT  
Transferring control of a secure element between TSMs comprises a zone master key established between the TSMs that facilitates encryption of a temporary key. The TSMs create the zone master key...
US20130322621 PRIVATE KEY GENERATION APPARATUS AND METHOD, AND STORAGE MEDIA STORING PROGRAMS FOR EXECUTING THE METHODS  
Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root...
US20140105386 COMPUTING GENUS-2 CURVES USING GENERAL ISOGENIES  
An Igusa class polynomial over rational numbers is computed from a set of Igusa class polynomials modulo a set of small primes. The set of Igusa class polynomials modulo a set of small primes is...
US20110150212 COMPUTER IMPLEMENTED METHOD FOR GENERATING A SET OF IDENTIFIERS FROM A PRIVATE KEY, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE  
The invention relates to a computer implemented method for generating a set of identifiers from a private key, the method comprising the steps of: calculating a set of public keys, wherein the...
US20120159179 DIGITAL SIGNATURES WITH ERROR POLYNOMIALS  
Representations of polynomials a, s, t, e—1 and e—2 can be provided. Values of coefficients of the polynomials can be limited, and can be computed using randomization techniques. A verification...
US20060083372 Biometrics-based cryptographic key generation system and method  
The present invention provides a biometrics-based cryptographic key generation system and method. A user-dependent distinguishable feature transform unit provides a feature transformation for each...
US20080056491 Methods and Systems For Managing Digital Sheet Music on a Digital Sheet Music Display System  
Method for transmitting digital sheet music from a music database to a local music management system. Establishing a connection between the music database and the local music management system....
US20150188700 DEVICE AND METHOD FOR GENERATING A SESSION KEY  
A device and method are provided for establishing a session key between two entities of a communication network that may be highly heterogeneous in terms of resources. The method, based on the...