AcclaimIP-ad

Match Document Document Title
US20090019551 INFORMATION SECURITY DEVICE AND COUNTER CONTROL METHOD  
A method is provided for flexibly setting a shared counter shared by a plurality of security modules sharing a counter in tree structures, while curbing the amount of secure memory used. The...
US20090193254 ANCHOR POINT-BASED DIGITAL CONTENT PROTECTION  
Digital content protection can be effectively implemented through use of an anchor point and binding records in a user domain. An anchor point domain may include a secure anchor point, and data...
US20110154038 Multi-band/multi-link secure key generation and delivery protocol  
A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.
US20080304661 CONTENT DISTRIBUTION/BROWSING SYSTEM, CONTENT DISTRIBUTION APPARATUS, CONTENT BROWSING APPARATUS AND PROGRAM  
A content distribution/browsing system is disclosed. First to (m−1)th encrypted content items E(K1, C1∥K2,1), . . . , E(Km−1, Cm−1∥Km,1) contain second to m-th (next in order) sharing keys K2,1, ....
US20080089519 Secure key exchange algorithm for wireless protocols  
A system for establishing encryption keys in a manner suitable for linking low complexity and/or power constrained wireless devices. The present invention uses a combination of encryption...
US20110016318 TECHNIQUES FOR SECURING SUPPLY CHAIN ELECTRONIC TRANSACTIONS  
Techniques for authenticating the identity of shippers and receivers of goods at each point along a supply chain. A central hub repository issues shippers and receivers a pair of public and...
US20120087493 METHOD FOR SECURING CREDENTIALS IN A REMOTE REPOSITORY  
A method of securing user credentials in a remote repository is provided. In accordance with one embodiment, there is provided a method comprising generating a first private key and a first public...
US20080144817 PASSWORD PROTOCOL FOR DATA COMMUNICATION SYSTEM  
A password protocol uses a multiple word password and provides prompts to a user allowing the user to select the next word in the password from a set of words. The selection of a word causes a...
US20100067690 SPA-RESISTANT LEFT-TO-RIGHT RECODING AND UNIFIED SCALAR MULTIPLICATION METHODS  
Provided is a scalar multiplication method unified with a simple power analysis (SPA) resistant left-to-right recording in a crypto system based on an elliptic curve and a pairing. The scalar...
US20140205089 SYSTEM AND METHOD FOR DIFFERENTIAL ENCRYPTION  
Some embodiments include a Trusted Security Module that creates secure connections using a set of split keys. Some embodiments include the creation of remote and local keys that are distributed to...
US20100150348 RFID AUTHENTICATION ARCHITECTURE AND METHODS FOR RFID AUTHENTICATION  
A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the tag, receiving the identification, using...
US20140161251 KEY MANAGEMENT SYSTEM  
According to one embodiment, a master key management device generates, by using a first secret key stored in a first storage unit and a third public key, a re-encryption key used to re-encrypt a...
US20100161982 HOME NETWORK SYSTEM  
A home network system includes: a plurality of wireless devices cooperated with a home network, each device having a tag attached thereto to identify it; a tag reader for reading tag information...
US20090198998 Method and apparatus of ensuring security of communication in home network  
Provided are a method and apparatus to ensuring communication security between a control apparatus and a controlled apparatus in a home network. The control apparatus in the home network...
US20100241871 METHOD AND APPARATUS FOR ESTABLISHING USAGE RIGHTS FOR DIGITAL CONTENT TO BE CREATED IN THE FUTURE  
Usage rights for a digital work are established prior to creation of the corresponding content. The rights can be associated with the content after the content is created. A content creation, such...
US20080137856 METHOD FOR GENERATING INDIRECT TRUST BINDING BETWEEN PEERS IN PEER-TO-PEER NETWORK  
Provided is a method for generating indirect trust binding between peers in a P2P network that allows communication and interaction between peers with trust even without an integrated processing...
US20060083370 RSA with personalized secret  
The present invention creates flexibility into the RSA cryptography. The goal is achieved by allowing a user to select a personalized secret such as a password to derive an exponent that functions...
US20110135088 CRYPTOGRAPHIC SECRET KEY DISTRIBUTION  
The present invention relates to cryptographic secret key distribution, wherein a value for a number of iterations can be individually set, so that the number of messages to be exchanged during...
US20090147951 METHOD OF HANDLING SECURITY KEY CHANGE AND RELATED COMMUNICATION DEVICE  
A method of handling security key change for a user equipment in a wireless communication system includes applying a radio resource control procedure to activate key change, where the radio...
US20110126014 Event Triggered Pairing of Wireless Communication Devices Based on Time Measurements  
An event-triggered pairing mechanism allows pairing wireless devices having short range interfaces (e.g., Bluetooth devices) by bumping the wireless devices together. A wireless device being...
US20060098819 Methods, devices and systems for generating anonymous public keys in a secure communication system  
Methods, devices and systems for generating a plurality of public keys from one private key with the same generator of a group are described. A public key cryptosystem is also disclosed for...
US20080165958 CONTENT DISTRIBUTION SYSTEM AND TRACKING SYSTEM  
A content distribution system encrypts a content by using different session keys assigned to user systems, encrypts each of the session keys with a public key corresponding to a decryption key...
US20090154694 CONTENTS MANAGEMENT SYSTEM, AND CONTENTS MANAGEMENT DEVICE  
Provided is a content management device, which is connected with a plurality of terminal devices for performing a content moving operation while considering the conveniences of the users of the...
US20090271637 INFORMATION PROCESSING TERMINAL AND STATUS NOTIFICATION METHOD  
The present invention aims at providing an information processing terminal, a status notification system, and a status notification method that can protect both privacy and security when a status...
US20100058074 RIGHT INFORMATION ENCRYPTION MODULE, NONVOLATILE MEMORY DEVICE, RIGHT INFORMATION RECORDING SYSTEM, RIGHT INFORMATION DECRYPTION MODULE, RIGHT INFORMATION READING SYSTEM, AND RIGHT INFORMATION RECORDING/READING SYSTEM  
A right information encryption module 110a comprises a key generation part 111a, a right information encryption part 112a, and a key management information generation part 113a. Key information Km...
US20050074118 Secure communication  
A method for generating a key includes reading a network data stream, selecting portions of data from the data stream, and assembling the selected portions to form the key. The key can then be...
US20110016314 METHODS AND ENTITIES USING IPSec ESP TO SUPPORT SECURITY FUNCTIONALITY FOR UDP-BASED OMA ENABLES  
Methods in OMA SEC_CF for providing security services to traffic over UDP between a client and a server and the relevant entities are provided. A pre-shared key is pre-shared between the client...
US20090204803 HANDLING OF SECURE STORAGE KEY IN ALWAYS ON DOMAIN  
Techniques for handling a secure storage key maintain the key in an always on domain and restore the key to the encryption/decryption engine when the engine is turned back on. The secure storage...
US20100161958 Device for Realizing Security Function in Mac of Portable Internet System and Authentication Method Using the Device  
The present invention relates to a device for performing a security function in a medium access control (MAC) layer in a wireless portable Internet system and an authentication method thereof. In...
US20120002808 Interleaving and deinterleaving method for preventing periodic position interference  
A method for implementing volatile cipher key and separate verification module by collecting physical features includes: physical features sensor is set on the handset, and control module can be...
US20150086009 HANDLING KEY ROTATION PROBLEMS  
Example embodiments include centralized systems for managing cryptographic keys and trust relationships among systems. Embodiments may include a centralized key store and a centralized policy...
US20090307488 HEALTH KEYSET MANAGEMENT  
Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided. Effectively, a central keyset manager...
US20100299528 METHOD FOR PROVIDING ACCESS CONTROL TO MEDIA SERVICES  
The present invention proposes a solution to prevent a program flow in a processing unit from being modified with respect to an intended program flow, thereby ensuring that important steps such as...
US20100135491 AUTHENTICATION METHOD  
A method of providing authentication of a mobile device in a telecommunications network comprising the steps of: providing a user defined first password to an authentication server in the...
US20080072071 Hard disc streaming cryptographic operations with embedded authentication  
A data storage system comprises a storage element, and an encryption and decryption unit connected between a host and the storage element, and using a key that is generated in the data storage system.
US20090116641 ACCESS CONTROL KEY MANAGEMENT IN A VIRTUAL WORLD  
Access control key management in a virtual world that includes generating a key for access to a virtual space, a service, an event, or an item in a virtual world, assigning one or more parameters...
US20090150978 ACCESS CONTROL OF CONTENT SYNDICATION  
A content syndication access control solution is provided. An illustrative content syndication access control system comprises: a syndication subscriber for acquiring a authorized content...
US20070297611 Method for Security Association Negotiation with Extensible Authentication Protocol in Wireless Portable Internet System  
The present invention relates to a security association negotiation method of extensible authentication protocol (EAP) for authenticating a subscriber station user in a wireless portable Internet...
US20140068261 Methods And Apparatus For Use In Sharing Credentials Amongst A Plurality Of Mobile Communication Devices  
Techniques for use in sharing a plurality of credential objects of a user account amongst a plurality of mobile devices operative in a wireless network are described. In one illustrative example,...
US20100002880 SYSTEM AND METHOD FOR LAWFUL INTERCEPTION USING TRUSTED THIRD PARTIES IN SECURE VoIP COMMUNICATIONS  
Disclosed is a system for lawful interception using a trusted third party in secure VoIP communication. A VoIP transmit terminal generates a secure packet using a master key received from a...
US20150023499 Cryptographic Key Generation  
A technique for generating a cryptographic key is provided. The technique is particularly useful for protecting the communication between two entities cooperatively running a distributed security...
US20130156182 Cryptographic Key Generation  
A technique for generating a cryptographic key is provided. The technique is particularly useful for protecting the communication between two entities cooperatively running a distributed security...
US20050226411 Method of generating electronic keys for a public-key cryptography method and a secure portable object using said method  
A method of generating electronic keys for a public-key cryptography method using an electronic device. In a first of two separate calculating steps, pairs of prime numbers (p, q) are calculated...
US20110261964 REDUNDANT KEY SERVER ENCRYPTION ENVIRONMENT  
Provided are a computer program product, system and method for a redundant key server encryption environment. A key server transmits public keys associated with the key server and at least one...
US20110116627 Fast Key-changing Hardware Apparatus for AES Block Cipher  
A fast key-changing hardware apparatus, which generates one sub-key each clock cycle, which is used by advanced encryption system (AES) algorithm block cipher, is independent from the AES...
US20140205090 METHOD AND SYSTEM FOR SECURELY COMPUTING A BASE POINT IN DIRECT ANONYMOUS ATTESTATION  
A method and system computes a basepoint for use in a signing operation of a direct anonymous attestation scheme. The method and system includes computing a basepoint at a host computing device...
US20080192928 Portable Electronic Storage Devices with Hardware Security Based on Advanced Encryption Standard  
Portable electronic storage devices with hardware based security are described. According to one exemplary embodiment of the present invention, a portable electronic storage device (PESD)...
US20100217979 System and Method for Providing Certified Proof of Delivery Receipts for Electronic Mail  
The present disclosure provides a system and method for certifying the delivery of electronic mail messages. In one embodiment, the sender contacts a proof-of-delivery-request creation server...
US20080212770 Key Information Generating Method and Device, Key Information Updating Method, Tempering Detecting Method and Device, and Data Structure of Key Information  
A domain key is used to perform chaining decryption with respect to encrypted content key information (ST203-1), and first data is extracted (ST203-2). The extracted first data is compared with...
US20080016370 Secure ID checking  
A cost-effective system that provides for the efficient protection of transmitted non-public attribute information may be used, for example, to control access to a secure area. Encryption of the...