Match Document Document Title
US20080063195 METHOD AND SYSTEM FOR ENCRYPTING OR DECRYPTING WMV STREAMING MEDIA  
Methods for encrypting or decrypting WMV streaming media are disclosed. The encrypting includes: acquiring WMV streaming media, generating a content key; and encrypting the WMV streaming media...
US20140369495 Secure modules using unique identification elements  
Various embodiments of the invention relate to secure systems and modules, and more particularly, to systems, devices and methods of generating and applying identification elements uniquely...
US20100027791 FUZZY PROTECTION OF VISUAL CONTENT  
A method and system for encoding visual information are described. An image is divided in to n number of patterns. Each pattern is mapped on a matrix i.e positioned on X and Y-axis. The patterns...
US20130034228 SECURE KEY CREATION  
Creating a secure key includes creating a token and populating a key control information section of the token with a value to indicate a minimum number of key parts used to form a key. Creating...
US20080114982 Method and arrangement for generation of a secret session key  
In a method for generation of a secret session key for cryptographically securing a communication channel between a first communication partner and a second communication partner, the first...
US20120314858 ENCODING/DECODING CIRCUIT  
An encoding/decoding operation portion includes an encoding/decoding operation circuit and an avoiding path for detouring the encoding decoding operation circuit and can select between encoding or...
US20080298581 Application-Specific Secret Generation  
A method, computer program product, and data processing system for protecting sensitive program code and data (including persistently stored data) from unauthorized access are disclosed. Dedicated...
US20130022197 RANDOM NUMBER GENERATOR, ENCRYPTION DEVICE, AND AUTHENTICATION DEVICE  
A random number generator includes an exclusive-OR circuit, a random number determiner, and a random number generation instruction inhibitor. The exclusive-OR circuit obtains an exclusive-OR of...
US20140161252 One-Way Key Fob and Vehicle Pairing Verification, Retention, and Revocation  
Embodiments of the invention provide methods for key fob to control unit verification, retention, and revocation. After an initial pairing between a key fob and a control unit, the devices share a...
US20100169224 PROTECTING PRIVACY OF PERSONALLY IDENTIFYING INFORMATION WHEN DELIVERING TARGETED ASSETS  
Techniques are disclosed herein for protecting personally identifying information (PII) and behavioral data while delivering targeted assets. In one aspect, a profile is created based on a...
US20120183135 RELIABLE PUF VALUE GENERATION BY PATTERN MATCHING  
A method is used to reliably provision and re-generate a finite and exact sequence of bits, for use with cryptographic applications, e.g., as a key, by employing one or more challengeable Physical...
US20080049932 KEY INFORMATION UPDATE RECORDING METHOD AND KEY INFORMATION UPDATE RECORDING APPARATUS  
According to one embodiment, a limited-access object is encrypted using key information, such as Title Key File, to be updated. The encrypted object data is recorded onto a medium such as an...
US20050063539 Prime-number-based method and apparatus for generating random numbers  
Random numbers are used for a variety of purposes and play key roles in systems such as simulation studies, information processing, communication, and encryption. Truly random numbers are...
US20110268269 COMPUTER IMPLEMENTED METHOD FOR GENERATING A PSEUDONYM, COMPUTER READABLE STORAGE MEDIUM AND COMPUTER SYSTEM  
The invention relates to a computer implemented method for generating a pseudonym for a user comprising entering a user-selected secret, storing the user-selected secret in memory, computing a...
US20090249492 Fabrication of computer executable program files from source code  
A method for protecting a computer program against manipulation and for shielding its communication with other programs against eavesdropping and modification is presented. The method comprises...
US20120155636 On-Demand Secure Key Generation  
A method is provided for generating on-demand cryptographic keys in a vehicle-to-vehicle communication system. At least one unique identifier is obtained relating to a user of the vehicle. The...
US20060280299 Method to grant modification rights for a smart card  
A Modification device (5) is designed to modify an application (A1, A2, A3, A4) run by a data carrier (S), wherein a first key information item (K1) is stored in the data carrier (S) and an...
US20140177831 KEY PROTECTING METHOD AND A COMPUTING APPARATUS  
A key protecting method includes the steps of: in response to receipt of an access request, configuring a control application program to generate a key confirmation request; in response to receipt...
US20080175386 Method and system for seamless SSID creation, authentication and encryption  
Using an identifier generation algorithm, a device coupled to a communication network generates an SSID and associated encryption key for a mobile device using its unique identifier. The...
US20120321076 Cryptographic ignition key system  
A cryptographic ignition key system and method for managing access to sensitive or protected information using an unclassified, block-cipher-based cryptographic combiner for storing non-private...
US20090282257 INFORMATION PROCESSING DEVICE, DISC, INFORMATION PROCESSING METHOD, AND PROGRAM  
An information processing device includes: a usage permission requesting unit configured to read out data from an IC chip in which the usage control information of a disc recorded content to...
US20090067629 Table-based encryption/decryption techniques for gaming networks, and gaming networks incorporating the same  
The exemplary embodiments described herein relate to a light-weight encryption/decryption technique for peripherals (e.g., gaming machines, overhead displays, a jackpot controllers, etc.) attached...
US20070280476 SYSTEM and METHOD FOR PROVIDING CIPHERED AND DECIPHERED CONTENTS TO USER, AND RELATED COMPUTER READABLE MEDIUM  
A set of users is divided into subsets, and a decipher key is generated for each subgroup by using different key generation polynomials. A session key, that is, a decipher key for ciphered data is...
US20140037087 COMMUNICATION DEVICE AND CRYPTOGRAPHIC KEY CREATION METHOD IN CRYPTOGRAPHIC KEY SHARING SYSTEM  
A communication device and a cryptographic key creation method are provided that enable efficient creation of cryptographic keys of which different error rates are required. A communication device...
US20080112559 Substitution cipher text-encoding and un-encoding software and method  
A method or computer program for encoding or un-encoding data receives a keyword string and removes characters in the keyword string which are not in a pre-approved character set and duplicate...
US20110213977 METHODS AND DEVICES FOR COMPUTING A SHARED ENCRYPTION KEY  
Embodiments described herein are generally directed to methods and devices in which computing devices, and mobile devices in particular, establish a shared encryption key for a device group...
US20070177729 Generation of perfectly secret keys in wireless communication networks  
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers...
US20100058061 CONTROLLING ACCESS TO DATA STREAMS  
Access to one or more data streams can be controlled by encrypting a description of how segments of the data streams can be assembled, for example, to produce an audio or video program. Access to...
US20090074183 INFORMATION PROCESSING APPARATUS, ELECTRONIC DEVICE, INFORMATION PROCESSING METHOD AND INFORMATION PROCESSING MEDIUM  
The usage restriction of a first content which has already been distributed is made to efficiently function when processing in which a second content refers to the first content is performed. A...
US20090252322 Method, medium, and system for encrypting and/or decrypting information of microarray  
Provided is a method of encrypting information of a microarray. The method includes: acquiring genetic information of a person by scanning the microarray; generating a secret key for identifying...
US20090225988 INFORMATION PROCESSOR, INFORMATION PROCESSING METHOD AND SYSTEM  
To prevent falsification of an attribute of data, a mechanism is provided, which encrypt document/image data while holding the attribute contained in electronic document data as a plain text and...
US20130083921 ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, PROGRAM, AND RECORDING MEDIUM  
In encryption, a random number r is generated to generate a ciphertext C2 =M (+) R(r), function values Hs(r, C2), a common key K, a ciphertext C(Ψ+1) of the random number r using the common key K,...
US20100046749 CONTENT PROTECTION APPARATUS, AND CONTENT UTILIZATION APPARATUS  
Content is divided into a plurality of partial contents. Next, each of the partial contents is encrypted using a browsing-control-use secret key. Also, an editing-control-use secret key and a...
US20100239087 ENCRYPTING VARIABLE-LENGTH PASSWORDS TO YIELD FIXED-LENGTH ENCRYPTED PASSWORDS  
According to one embodiment, encrypting passwords includes performing the following for each input password of a plurality of input passwords to yield encrypted passwords, where at least two input...
US20090316887 DATABASE ENCRYPTION AND QUERY METHOD KEEPING ORDER WITHIN BUCKET PARTIALLY  
A database encryption and query method keeping an order within a bucket partially, which encrypts and stores numeric data in a database, includes calculating a relative value of a plaintext within...
US20070104326 Generation of unique significant key from URL get/post content  
Generating a unique URL key for a web document according to an obtained key generating policy. The URL of a web page is parsed according to the policy in order to generate the URL key. Preferably,...
US20100202609 SECURING MULTIFACTOR SPLIT KEY ASYMMETRIC CRYPTO KEYS  
Techniques for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions are provided. A first one of multiple factors is stored. All of the...
US20090304180 KEY EVOLUTION METHOD AND SYSTEM OF BLOCK CIPHERING  
A system and associated method for block ciphering. The method generates a key that is specific to a text block being encrypted and later being decrypted. The text block is encrypted by a block...
US20100174910 Public Key Encryption with Digital Signature Scheme  
An improved encryption and digital signature system and method in accordance with the invention reuses an encryption ephemeral key pair from an encryption process in a digital signature process....
US20130170645 ENCRYPTION AND DECRYPTION DEVICES AND METHODS THEREOF  
Encryption and decryption devices, computer readable media, and methods thereof. The decryption device comprises a key generator and a decryption module. The key generator is capable of receiving...
US20120128152 BROADCAST ENCRYPTION BASED MEDIA KEY BLOCK SECURITY CLASS-BASED SIGNING  
Provided are techniques for verifying, by a first device, that a management key block of a second device is valid. A management key block that includes a plurality of verification data, each of...
US20130230167 USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS  
A method and system for ascertaining an object status of an object associated to an authenticity certificate. A first hashing result of an object identifier encoded within a decrypted first...
US20100275264 COMPUTER FOR CONTROLLING STORAGE SYSTEM PROVIDED WITH ENCRYPTION/DECRYPTION FUNCTION  
A computer is coupled to at least one E/D storage (a storage system provided with an encryption/decryption function). A computer determines whether or not a security policy related to a copy...
US20090202070 Robust Cipher Design  
In an iterated block cipher, a method for round key encryption and key generation, the method including providing a first function Fi and a second function Fj, providing a round key generation...
US20120076294 ARITHMETIC METHOD AND APPARATUS FOR SUPPORTING AES AND ARIA ENCRYPTION/DECRYPTION FUNCTIONS  
Provided are an arithmetic method and apparatus for supporting Advanced Encryption Standard (AES) and Academy, Research Institute and Agency (ARIA) encryption/decryption functions. The apparatus...
US20120308000 Combining Key Control Information in Common Cryptographic Architecture Services  
A system includes a processor configured to perform a method, the method comprising receiving a first key token, second key token and a request to combine the first key token with the second key...
US20130064367 ACCELERATED VERIFICATION OF DIGITAL SIGNATURES AND PUBLIC KEYS  
Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve...
US20070206789 Elliptic curve cryptosystem optimization using two phase key generation  
A computer-implemented method of generating an elliptic curve cryptosystem (ECC) signature includes the steps of: generating a first random key (k1) having n bits, where n is a natural number;...
US20080112566 Apparatuses for accessing content based on a session ticket  
An apparatus is provided. The apparatus includes a memory and a processor in communication with the memory. The processor is configured to: transmit a request to a memory device to access content...
US20100098246 SMART CARD BASED ENCRYPTION KEY AND PASSWORD GENERATION AND MANAGEMENT  
An apparatus can include a smart card based encryption key management system used to generate an encryption key using encryption key seed material, and an encryption key data store to store the...