Match Document Document Title
US20130077781 METHOD OF KEY DERIVATION IN AN INTEGRATED CIRCUIT  
A method of derivation, by an electronic circuit, of a first key from a second key, wherein: at least one third key is derived from the second key and is used to derive the first key; and a value...
US20100080395 CRYPTOGRAPHIC METHOD FOR A WHITE-BOX IMPLEMENTATION  
A cryptographic method is implemented in a white-box implementation thereof. The method comprises applying a plurality of transformations (802) each replacing an input word by an output word, and...
US20140270157 INTERNET PROTOCOL NETWORK MAPPER  
A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that...
US20100017627 ENSURING AUTHENTICITY IN A CLOSED CONTENT DISTRIBUTION SYSTEM  
A technique for maintaining encrypted content received over a network in a secure processor without exposing a key used to decrypt the content in the clear is disclosed.
US20090034722 METHOD OF ENCRYPTING AND DECRYPTING DATA STORED ON A STORAGE DEVICE USING AN EMBEDDED ENCRYPTION/DECRYPTION MEANS  
A method of encrypting data is provided that uses a medium key retrieved from a storage medium. The medium key is combined with another key to generate a combination key. Content is encrypted...
US20080037777 SYSTEM AND METHOD FOR PROVIDING ENCRYPTION IN PIPELINED STORAGE OPERATIONS IN A STORAGE NETWORK  
In accordance with embodiments of the invention, a method is provided for performing a storage operation in a pipeline storage system in which one or more data streams containing data to be stored...
US20150110268 METHOD FOR CODING AND DECODING INFORMATION ASSOCIATED WITH AN ITEM  
A method for coding and decoding information (10) associated with an item includes the steps of coding the information (10) associated with the item through an encryption key (20) and a first...
US20140233731 Device and Method for Generating Keys with Enhanced Security for Fully Homomorphic Encryption Algorithm  
There is proposed a method of generating secret and public keys vDGHV with enhanced security, implemented in a device including at least one microprocessor and a memory. The method includes...
US20080226075 Restricted services for wireless stations  
A technique for providing restricted access to a wireless network involves recognizing a service descriptive identifier (SDID). The SDID may be transmitted to wireless stations that query the...
US20130156181 APPARATUS AND METHOD FOR GENERATING SECRET KEY USING CHANGE IN WIRELESS CHANNEL ON WIRELESS COMMUNICATION NETWORK  
A secret key generation apparatus and method are provided. The secret key generation apparatus includes at least one antenna, amplification/phase controllers, a transceiver, and a random sign&...
US20100217986 AUTHENTICATED SECRET SHARING  
A method and system distributes N shares of a secret among cooperating entities by forming a mathematical construct that has an embedded internal structure to allow authentication of a...
US20150163059 METHOD OF GENERATING A PUBLIC KEY FOR AN ELECTRONIC DEVICE AND ELECTRONIC DEVICE  
A method for generating a public key for an electronic device is provided, wherein the method comprises generating a public key 103 based on a private key and a unique identifier associated with...
US20130315395 Embedded Authentication Protocol for Quantum Key Distribution Systems  
In methods and systems to authenticate systems in a quantum key distribution environment based on limited disclosures and identical, re-usable, pre-provisioned authentication keys, each system...
US20100177897 TELECOMMUNICATION SYSTEMS AND ENCRYPTION OF CONTROL MESSAGES IN SUCH SYSTEMS  
The present invention relates to a solution for handling encryption of control messages in a wireless telecommunications network. Key generation is based on sequence numbers and the present...
US20120237024 Security System Using Physical Key for Cryptographic Processes  
One embodiment of the invention is based on the recognition that by keeping the encryption key (DEK) in a key device, and using the key device to perform all encryption and decryption, where the...
US20090073935 APPARATUS AND METHODS OF PMIPv6 ROUTE OPTIMIZATION PROTOCOL  
A network component is provided. The network component is configured to receive a handover context from a first access network device. The network component is capable of sending a first proxy...
US20090052665 Bulk Data Erase Utilizing An Encryption Technique  
A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a data storage drive...
US20110167273 METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR  
The present invention relates to a method for secure communications and communication networks having communication devices, using secure means like encryption system for securing communications....
US20090092249 Media key-transformation obfuscation in advanced access content system  
A modified media key used to decrypt protected media content stored on an optical disc, such as an HD-DVD or Blu-ray disc, is created through application of a transformation using a constant value...
US20100017617 RADIO FREQUENCY IDENTIFICATION (RFID) SECURITY APPARATUS HAVING SECURITY FUNCTION AND METHOD THEREOF  
Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using...
US20150220753 DESIGN PATTERN FOR SECURE STORE  
A computer system, computer product, and method for accessing a secure store, which includes receiving a request to access a secure store, checking the file path of the request to make sure it...
US20090202068 MEDIA SECURITY THROUGH HARDWARE-RESIDENT PROPRIETARY KEY GENERATION  
A method, system and apparatus of an author website in a commerce environment are disclosed. In one embodiment, a system includes a host processor; a first security circuit to re-encrypt a work of...
US20090106551 DYNAMIC DISTRIBUTED KEY SYSTEM AND METHOD FOR IDENTITY MANAGEMENT, AUTHENTICATION SERVERS, DATA SECURITY AND PREVENTING MAN-IN-THE-MIDDLE ATTACKS  
A distributed key encryption system and method is provided in which a key storage server provides a session key to the source and destination computers by encrypting the session key with unique...
US20080310628 Backup Management Device, Backup Management Method, Computer Program, Recording Medium, Integrated Circuit, and Backup System  
To provide a backup management device that deletes a content so as to be restorable in the future while protecting a copyright of the content, in a case where there exists a backup of the content....
US20100091986 Information Management System and Encryption System  
A system capable of surely preventing a theft or leak of information which comprises: an information registration destination decision unit deciding registration destinations of information; a...
US20120269342 BLOCK ENCRYPTION DEVICE AND METHOD AND COMPUTER PROGRAM  
In block cipher based on generalized Feistel network, pseudorandomness and strong-pseudorandomness may be fulfilled efficiently. In encrypting a plaintext of kn-bit blocks, Feistel permutation is...
US20130272520 METHOD OF GENERATING KEY  
According to a method of generating a key of the present invention, a first device and a second device are first brought into contact with one vibrator. In this state, the vibrator generates...
US20120257745 Split-Key Key-Agreement Protocol  
There is provided a method of one member of a first entity generating an intra-entity public key. The first entity has a plurality of members and the one member has a long-term private key and a...
US20080126806 PRE-BINDING AND TIGHT BINDING OF AN ON-LINE IDENTITY TO A DIGITAL SIGNATURE  
A method, apparatus, and system are directed towards generating a public/private key pair prior to registration. The generation of the public/private key pair is performed by the entity to which...
US20150036819 QUANTUM-KEY-DISTRIBUTION RECEIVING DEVICE AND METHOD FOR USING SINGLE-PHOTON DETECTOR  
There is provided a quantum-key-distribution receiving device used in a quantum key distribution system that utilizes a pair of quantum-entangled photons including a signal photon and an idler...
US20100166184 METHOD OF HANDLING SECURITY CONFIGURATION IN WIRELESS COMMUNICATIONS SYSTEM AND RELATED COMMUNICATION DEVICE  
A method of handling security configuration for a mobile device using a mapped security context in a wireless communication system includes utilizing the mapped security context to derive...
US20130039487 Coordinating compression information for unreliable encrypted streams through key establishment protocols  
In one embodiment, a method includes transmitting compression information from a sender node to a receiver node in a key establishment protocol exchange and transmitting an encrypted compressed...
US20080123843 Method for binding a security element to a mobile device  
According to an aspect of the present invention there is provided a method of binding a security element to a device, comprising: generating a passkey to encrypt the security element, the passkey...
US20090175443 Secure function evaluation techniques for circuits containing XOR gates with applications to universal circuits  
An embodiment of the present invention provides a method that minimizes the number of entries required in a garbled circuit associated with secure function evaluation of a given circuit. Exclusive...
US20090238368 Key distribution system  
The cloning source of an authorized receiving device cannot be identified. A key distribution system 1 concerning the present invention includes: a communication channel 10; a key distribution...
US20140254794 SESSION KEY GENERATION AND DISTRIBUTION WITH MULTIPLE SECURITY ASSOCIATIONS PER PROTOCOL INSTANCE  
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a first network element of a...
US20100303238 Session Key Generation and Distribution with Multiple Security Associations per Protocol Instance  
A single instance of a session key generation protocol is executed in a manner that generates a plurality of security associations between user equipment and a first network element of a...
US20100104097 SYSTEM AND METHOD FOR UCC CONTENTS PROTECTION  
The present invention relates to a user created contents protection system and method. Copyright protection for protecting contents on user created contents is performed by using a contents upload...
US20060018465 Information-processing system, information-processing apparatus, information-processing method, and program  
In an information-processing system, information is divided into first units of information, a single number is generated for each of second units of information including the first units of...
US20070014399 High assurance key management overlay  
A key management overlay system includes a first key management system that produces a first cryptographic key, a second key management system that produces a second cryptographic key, and a math...
US20090323958 EXTENDING A SECRET BIT STRING TO SAFEGUARD THE SECRET  
A method and system extends a secret bit string to safeguard the secret. In one embodiment, the method comprises adding a secret bit string of length s to a product of two random bit strings using...
US20080008315 METHOD FOR KEY DIVERSIFICATION ON AN IC CARD  
Key diversification is performed during a mutual authentication between a SAM integrated circuit (IC) card storing a master key, and a user IC card storing an identification number. The user IC...
US20090136041 Secure information storage system and method  
The present invention systems and methods facilitate secure communication of information between devices. A present invention system and method can enable secure communication of proprietary...
US20070157322 Installation for protected access to a digital content  
The installation for protected access to a digital content comprises: a candidate user identification means,a lock adapted to lock or unlock an access gate to a restricted area containing at least...
US20120011578 Cross-protocol federated single sign-on (F-SSO) for cloud enablement  
A method to enable access to resources hosted in a compute cloud begins upon receiving a registration request to initiate a user's registration to use resources hosted in the compute cloud. During...
US20120008769 Method and System For Managing A Distributed Identity  
A method for managing a distributed identity, including retrieving identification data of a user, wherein the identification data includes a username, a password, and metadata; receiving, from a...
US20110093710 LOW-LATENCY PEER SESSION ESTABLISHMENT  
A source device and a target device may endeavor to form a secure communication session whereby encrypted messages may be transmitted over an untrusted network, such as the internet. However, the...
US20110066859 FLEXIBLE BROADCAST AUTHENTICATION IN RESOURCE-CONSTRAINED SYSTEMS: PROVIDING A TRADEOFF BETWEEN COMMUNICATION AND COMPUTATIONAL OVERHEADS  
A method for authenticating a message that is transmitted wirelessly. The method includes providing a set of private key values that define a private key and performing a key pair generation...
US20140169558 SECURE NODE ADMISSION IN A COMMUNICATION NETWORK  
A system and method for node admission in a communication network having a NC and a plurality of associated network nodes. According to various embodiments of the disclosed method and apparatus,...
US20120014520 BIOMETRIC ENCRYPTION AND KEY GENERATION  
A system, method and program product for generating a private key. A system is disclosed that includes a signal acquisition system for obtaining biometric input from a user and encoding the...