Match Document Document Title
US20130287209 ENCRYPTION PROCESSING DEVICE AND METHOD  
A constant multiplier inputs a base and a modulo n, performs modular exponentiation modulo n with a prescribed constant as the exponent and with base a, and outputs the result of this calculation...
US20130266137 Digital rights managment system, devices, and methods for binding content to an intelligent storage device  
The present invention relates to digital rights management (DRM) for content that may be downloaded and bound to a storage device. The storage device may be an intelligent storage device, such as...
US20100091995 SIMPLE PROTOCOL FOR TANGIBLE SECURITY  
The claimed subject matter provides systems and/or methods that effectuate a simple protocol for tangible security on mobile devices. The system can include devices that generate sets of keys and...
US20130322624 ENCRYPTION DEVICE AND METHOD FOR DEFENDING A PHYSICAL ATTACK  
Provided are a security device and a method for operating same. The security device may conceal an encryption key used for an encryption algorithm in an encryption module in correspondence to...
US20090144542 SYSTEM FOR DISTRIBUTING DIGITAL MEDIA TO EXHIBITORS  
A system for packaging digital media and distributing digital media to exhibitors is described, which system enables distribution by utilizing media content booking, media content packaging,...
US20140112470 METHOD AND SYSTEM FOR KEY GENERATION, BACKUP, AND MIGRATION BASED ON TRUSTED COMPUTING  
The present invention relates to the field of computer technologies and discloses a method and a system for key generation, backup, and migration based on trusted computing, including: receiving a...
US20130077783 METHOD AND APPARATUS FOR ESTABLISHING A KEY AGREEMENT PROTOCOL  
A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a...
US20120057699 METHOD AND APPARATUS FOR ESTABLISHING A KEY AGREEMENT PROTOCOL  
A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a...
US20100177770 Peer-To-Peer Telephone System  
There is provided a peer-to-peer telephone system comprising a plurality of end-users and a communication structure through which one or more end-users are couplable for communication purposes....
US20100284539 Methods for Protecting Against Piracy of Integrated Circuits  
Techniques are provided for reducing the likelihood of piracy of integrated circuit design using combinational circuit locking system and activation protocol based on public-key cryptography....
US20140146965 METHOD TO VERIFY THAT A USER HAS MADE AN EXTERNAL COPY OF A CRYPTOGRAPHIC KEY  
A cryptographic key for a client is generated at a server. The cryptographic key has a key identification and a corresponding key value. The key identification and the corresponding key value are...
US20120036362 Secret-Key Exchange for Wireless and Sensor Networks  
A mechanism is provided for establishing a shared secret-key for secure communication between nodes in a wireless network. A first node in the wireless network provides a spreading code to a...
US20150244518 VARIABLE-LENGTH BLOCK CIPHER APPARATUS AND METHOD CAPABLE OF FORMAT PRESERVING ENCRYPTION  
A variable-length block cipher apparatus and method capable of format preserving encryption are provided. An encryption device for a variable-length block cipher apparatus includes an encryption...
US20070064935 Generating key information for mutual access among multiple computers  
Generating key information for mutual access among multiple computers A method for generating key information for mutual access among multiple computers, the method including configuring each of a...
US20110158404 REBINDING OF CONTENT TITLE KEYS IN CLUSTERS OF DEVICES WITH DISTINCT SECURITY LEVELS  
According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in...
US20150256342 AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND PROGRAM  
An authentication device includes circuitry that holds L (L≧2) secret keys si (i=1 to L) and L public keys yi that satisfy yi=F(si) with respect to a set F of multivariate polynomials of n-th...
US20080267394 Identity-Based Key Generating Methods and Devices  
The present invention discloses a method and device of generating asymmetrical key pair (public key and private key) based on user identity. Key Management Center (KMC) generates public/private...
US20150124961 Public Key Encryption Algorithms for Hard Lock File Encryption  
In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way...
US20110055558 GALOIS/COUNTER MODE ENCRYPTION IN A WIRELESS NETWORK  
A system includes a temporal key module, a nonce module, and a security module. The temporal key module is configured to generate a first temporal key. The first temporal key is to be used to...
US20130301829 ELECTRONIC KEY REGISTRATION SYSTEM  
An electronic key registration system includes a controller of a communication subject, an initial electronic key that communicates with the communication subject and has an initial encryption key...
US20130230166 USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS  
A method and system for generating data for use in generating an authenticity certificate. A request is received for a step certificate that authenticates an involvement of the requester entity...
US20090217032 METHOD FOR GENERATING SAK, METHOD FOR REALIZING MAC SECURITY, AND NETWORK DEVICE  
A method for generating a secure association key (SAK), a method for realizing medium access control security (MACsec) and a network device are provided. The method for generating an SAK includes...
US20150023498 BYZANTINE FAULT TOLERANCE AND THRESHOLD COIN TOSSING  
A coin share generator (5) is employed in a system for performing a threshold coin tossing scheme. The coin share generator (5) comprises a coin determining unit (6) for determining a coin value,...
US20150207621 METHOD FOR CREATING ASYMMETRICAL CRYPTOGRAPHIC KEY PAIRS  
The invention relates to a method for creating a set of asymmetrical cryptographic key pairs, wherein the set of key pairs has a first key pair (K1) and a second key pair (K2), wherein the first...
US20120063594 METHOD FOR CREATING ASYMMETRICAL CRYPTOGRAPHIC KEY PAIRS  
The invention relates to a method for creating a set of asymmetrical cryptographic key pairs, wherein the set of key pairs has a first key pair (K1) and a second key pair (K2), wherein the first...
US20130031620 LOCALIZED NETWORK AUTHENTICATION AND SECURITY USING TAMPER-RESISTANT KEYS  
The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device...
US20130272521 Key Generation Using Multiple Sets of Secret Shares  
A cryptographic method, including generating, using a meta-secret, a first plurality of cryptographic keys, each cryptographic key associated with a respective key identifier, creating, using the...
US20070172069 Domain management method and apparatus  
A method and apparatus of protecting digital content within a domain is provided. if a device registered with a domain withdraws from the domain, a domain key used in the domain before withdrawal...
US20130129087 Secure Key Generation  
Methods and systems for secure key generation are provided. In embodiments, during the manufacturing process, a device generates a primary seed for the device and stores the seed within the...
US20100088521 PUBLIC ENCRYPTED DISCLOSURE  
Public encrypted disclosure provides a creation date verification system by making confidential information available in a secure encrypted form that can be decrypted at a later time to verify the...
US20110158403 ON-THE-FLY KEY GENERATION FOR ENCRYPTION AND DECRYPTION  
Methods and apparatus to provide on-the-fly key computation for Galois Field (also referred to Finite Field) encryption and/or decryption are described. In one embodiment, logic generates a cipher...
US20070036355 Key generating method and key generating apparatus  
A key generating method is disclosed which includes the steps of: firstly detecting first change information as first change information data; secondly detecting second change information...
US20090052663 METHODS FOR CREATING SECRET KEYS BASED UPON ONE OR MORE SHARED CHARACTERISTICS AND SYSTEMS THEREOF  
A method and system for generating one or more keys includes obtaining at two or more devices data based on movement of at least one of the devices with the respect to the other device. At least...
US20110091036 Cryptographic Key Generation  
A technique for generating a cryptographic key (120) is provided. The technique is particularly useful for protecting the communication between two entities (202, 302; 204, 304) cooperatively...
US20100080383 SECURE PROVISIONING OF A PORTABLE DEVICE USING A REPRESENTATION OF A KEY  
A portable device initially accesses a secure server and requests a certificate. The secure server generates a random key and encodes the generated key to generate a representation of the key,...
US20120020476 Method for Performing a Cryptographic Task in an Electronic Hardware Component  
A method and apparatus are provided to perform a cryptographic task on at least one numerical datum in an electronic hardware component. The method includes a step of at least partial use of an...
US20100138668 CONTENT DELIVERY SYSTEM  
An information delivery device interacting with a user's eye, the device comprising an eye characteristic reader for reading at least one characteristic of the user's eye, a retinal projector for...
US20140307871 METHOD FOR KEY ESTABLISHMENT USING ANTI-COLLISION ALGORITHM  
A method for a key establishment in RFID system using an adaptive Q anti-collision algorithm, the method comprising:generating group key between a reader and a number of tags using values of Q...
US20150146870 METHOD AND ARRANGEMENT IN A TELECOMMUNICATION SYSTEM  
A method in a User Equipment (UE) of an Evolved Packet System (EPS) establishes a security key (K_eNB) for protecting Radio Resource Control/User Plane (RRC/UP) traffic exchanged with a serving...
US20140098953 Key Derivation System  
A device generates a content key that depends upon device security state information. For example, the device may retrieve a first content key and a security state, and then derive a content key...
US20080059806 Vehicle information rewriting system  
A rewriting tool for rewriting a content of a nonvolatile memory including vehicle information and the like provides a supplemental authentication process that detects a wireless authentication...
US20090327723 SECURE TRANSFER OF DIGITAL OBJECTS  
Transferring a digital object, comprising: receiving a digital object; validating the received digital object according to predefined rules; building a description of the validated digital object;...
US20150180654 Secure Provision of a Key  
The embodiments relate to a method and a digital circuit area for securely providing a key using a request unit and a provision unit. In this case, a key is derived from parameters, at least one...
US20150010145 ELECTRONIC KEY REGISTRATION METHOD AND ELECTRONIC KEY REGISTRATION SYSTEM  
A method for registering first and second electronic keys, which are capable of controlling a communication subject, to a controller of the communication subject, wherein the first electronic key...
US20090060178 Management system for web service developer keys  
Various technologies and techniques are disclosed for managing web service developer keys. A generic key identifier can be generated based on an original web service key. The generic key...
US20120155428 LTE Network Call Correlation During User Equipment Mobility  
A network monitoring system captures data packet from LTE/SAE network interfaces using passive probes. The monitoring system identifies context data associated with a first user on an S1-MME...
US20070140483 Combination-based broadcast encryption method  
A combination-based broadcast encryption method includes: assigning by a server a base group of different combinations to each user; producing and sending secret information for each user by using...
US20130163755 PROTECTION METHOD, DECRYPTION METHOD, PLAYER, STORAGE MEDIUM, AND ENCRYPTION APPARATUS OF DIGITAL CONTENT  
A digital content protection method includes distributing, together with an encrypted content, an encrypted protected program key, a protected content key, and a protected code including an...
US20070058807 Establishing a unique session key using a hardware functionality scan  
Systems and methods for independently generating a unique private session key at one or more hardware devices within a computing system using a subset of the functionality implemented in a...
US20080181399 COMPOSITE CRYPTOGRAPHIC ACCELERATOR AND HARDWARE SECURITY MODULE  
The functionality of a hardware security module is combined with that of a cryptographic accelerator in a single device. A single device comprising a hardware security module configured to...