Match Document Document Title
US20140185796 Geographical Passwords  
An access credential based on geographical information. Users can select geographical locations (such as favorite places, mountains, trees, rivers or others) as their access credential to...
US20130279691 Secure Key Authentication and Ladder System  
Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key...
US20140105387 LEVEL-TWO DECRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20100310078 SYSTEM FOR USER-CENTRIC IDENTITY MANAGEMENT AND METHOD THEREOF  
A user terminal for a user-centric identity management system includes: a browser that requests a service to the service provider server and receives a service parameter in which a plurality of...
US20130016834 SECURITY COUNTERMEASURES FOR POWER ANALYSIS ATTACKS  
A countermeasure for differential power analysis attacks on computing devices. The countermeasure includes the definition of a set of split mask values. The split mask values are applied to a key...
US20100241862 MULTIDIMENSIONAL IDENTIFICATION, AUTHENTICATION, AUTHORIZATION AND KEY DISTRIBUTION SYSTEM FOR PATIENT MONITORING  
A method, wireless system and a wireless device are described. The method, system and device provide multidimensional identification, authentication, authorization and key distribution providing...
US20110075839 SYSTEM AND METHOD FOR QUANTUM CRYPTOGRAPHY  
Provided are a system and a method for quantum cryptography. The method includes generating the same quantum cryptography key in a transmitter and a receiver by measuring a...
US20130121487 System And Method For Deterministic Generation Of A Common Content Encryption Key On Distinct Encryption Units  
Various embodiments of a system and method for deterministic generation of a common content encryption key on distinct encryption units are described. Embodiments may include, for each given...
US20120183136 APPARATUS AND METHOD FOR GENERATING A KEY FOR BROADCAST ENCRYPTION  
An apparatus and method for generating a key for a broadcast encryption. The apparatus includes a node secret generator for managing a user that receives broadcast data in a tree structure and for...
US20110129088 METHOD AND SYSTEM FOR AUTHENTICATING A MOBILE TERMINAL IN A WIRELESS COMMUNICATION SYSTEM  
A method and system for authenticating in a wireless communication system. The system includes a Mobile Terminal (MT), an authenticator, and an Authentication, Authorization, Accounting (AAA)...
US20130195266 Apparatus and Method for Producing a Message Authentication Code  
An apparatus for producing a message authentication code based on a first message and an original key is provided. The apparatus includes a key generator configured to produce a generated key...
US20110209212 AUTHORIZATION SCHEME TO MINIMIZE THE USE OF UNAUTHORIZED MEDICAL DEVICE DISPOSABLES ON A MEDICAL DEVICE INSTRUMENT  
Systems, methods, apparatus, and computer readable media are provided for disposable component authentication with respect to a biological fluid processing device instrument. An example instrument...
US20130054972 SYSTEMS AND METHODS FOR SECURING CONTENT DELIVERED USING A PLAYLIST  
Systems and methods in accordance with embodiments of the invention enhance the security of content distribution using individualized playlists. In many embodiments, a playlist is individually...
US20150139418 Method and Apparatus for User Identity Verification  
The present disclosure describes a method and apparatus for user identity verification as a user migrates amongst systems, servers, computing environments and/or segments within a cloud computing...
US20130182840 System and Method of Lawful Access to Secure Communications  
The present disclosure relates to systems and methods for secure communications. In some aspects, a method of signalling an interception time period is described. At least one keying information...
US20150117641 PROTECTION METHOD AND SYSTEM FOR DISTRIBUTING DIGITAL FILES WHETHER NEW, SECOND-HAND, FOR RENTAL, EXCHANGE OR TRANSFER  
Methods for generating a virtual recursive secure container and for generating a virtual secure container of relationship of rights along with a system that distributes copyrighted digital...
US20130108041 METHODS AND SYSTEMS FOR PERSONAL AUTHENTICATION  
A method for creating personal authentication keys includes the steps of determining a number of RFID tags, generating a key, partitioning the key into a number of parts, the number of parts...
US20110131414 METHODS AND SYSTEMS FOR END-TO-END SECURE SIP PAYLOADS  
Methods, systems and communication nodes for protecting Session Initiation Protocol (SIP) message payloads are described. Different protection techniques can be used to protect SIP payloads...
US20110047377 SECURE DIGITAL COMMUNICATIONS VIA BIOMETRIC KEY GENERATION  
Systems and methods for secure communications in a communications network (100), including a server (102) and a client device (104a, 104b), are provided. A method includes transmitting a...
US20130101119 QUANTUM KEY DISTRIBUTION USING CARD, BASE STATION AND TRUSTED AUTHORITY  
Techniques and tools for quantum key distribution (“QKD”) between a quantum communication (“QC”) card, base station and trusted authority are described herein. In example implementations, a QC...
US20090196425 Method for Authenticating Electronically Stored Information  
A system for authenticating electronically stored information (ESI) with a first key and a second key. The comparison of the first key and the second key are used to authenticate the second...
US20090164804 SECURED STORAGE DEVICE  
A method of preventing unauthorized access to digital content includes obtaining from a trusted entity a public key of a public-private key pair, encrypting content being received by a storage...
US20130266138 CONTENT ENCRYPTION KEY MANAGEMENT  
Systems and methods for managing a content encryption key and a seed to generate the content encryption key are provided. In one example, a method may include receiving a request for a content...
US20130089205 Token Provisioning Method  
The present invention discloses a token provisioning method for a token provisioning system. The token provisioning method includes steps of generating at least one encryption key at a customer...
US20110085659 Method and apparatus for generating a signature for a message and method and apparatus for verifying such a signature  
A method of generating a signature σ for a message m, the method enabling online/offline signatures. Two random primes p and q are generated, with N=pq; two random quadratic residues g and x are...
US20120039466 Method of Compressing a Cryptographic Value  
A computer implemented method of compressing a digitally represented cryptographic value. The method comprising the steps of: (a) selecting a secret value; (b) performing a cryptographic operation...
US20150131796 ENCRYPTION KEY GENERATION  
A method of generating an encryption key. The method comprises collecting a plurality of user defined variables defined by input from a user and collecting a plurality of environmental variables...
US20110158405 KEY MANAGEMENT METHOD FOR SCADA SYSTEM  
Disclosed is a shared key management method for SCADA system in which a master terminal unit (MTU), a plurality of sub-master terminal units (sub-MTUs), and a plurality of remote terminal units...
US20110075838 Technique for Distributing Software  
A computer program product and method for installing downloaded software on a client system over a network is described. The product and method include generating an access key by receiving an...
US20110142242 QUANTUM PUBLIC KEY ENCRYPTION SYSTEM, KEY GENERATION APPARATUS, ENCRYPTION APPARATUS, DECRYPTION APPARATUS, KEY GENERATION METHOD, ENCRYPTION METHOD, AND DECRYPTION METHOD  
Provided is a key generation apparatus that generates, based on a generated random number, quantum gates Ui, L and R corresponding respectively to m types of unitary operations Ui corresponding to...
US20100299518 PORTABLE SECURE COMPUTING NETWORK  
As provided herein, when using an untrusted network connection, a secure online environment can be created for a remote machine by connecting to a trusted computer with a trusted network...
US20130148803 MULTI-USER SEARCHABLE ENCRYPTION SYSTEM AND METHOD WITH INDEX VALIDATION AND TRACING  
A multi-user searchable encryption system includes a key generation center to issue a private secret key to a user and trace information regarding a user who has generated an index, and a user...
US20110299685 SECURE MOBILE AD HOC NETWORK  
Security in a mobile ad hoc network is maintained by using various forms of encryption, various encryption schemes, and various multi-phase keying techniques. In one configuration, an over the...
US20140064482 Industrial Protocol System Authentication and Firewall  
Aspects of the present invention provide machines, systems, and methods in which industrial control systems may be secured from compromise and/or disruption via authentication and firewall. In...
US20130077785 Method for Updating Air Interface Key, Core Network Node and Radio Access System  
The disclosure discloses a method for updating an air interface key, a core network node and a radio access system, wherein the method for updating an air interface key comprises: a core network...
US20150171870 SECRET OPERATIONS USING RECONFIGURABLE LOGICS  
An integrated circuit includes a programmable logic device and optionally a control circuit coupled to the programmable logic device (PLD). The control circuit may detect that a reconfiguration...
US20120237025 DEVICE AND METHOD FOR DETERMINING AN INVERSE OF A VALUE RELATED TO A MODULUS  
A device for determining an inverse of an initial value related to a modulus, comprising a unit configured to process an iterative algorithm in a plurality of iterations, wherein an iteration...
US20090154711 MULTI-PARTY KEY AGREEMENT METHOD USING BILINEAR MAP AND SYSTEM THEREFOR  
The present invention provides an efficient method and system in which a plurality of participants share a secret key in a communication environment that is not ensured. According to an embodiment...
US20130183934 METHODS FOR INITIALIZING AND/OR ACTIVATING AT LEAST ONE USER ACCOUNT FOR CARRYING OUT A TRANSACTION, AS WELL AS TERMINAL DEVICE  
The present invention in particular relates to a method for initializing and/or activating at least one user account and/or a user identifier with at least one service provider by means of a first...
US20140192977 MUTIPLICATION METHOD AND MODULAR MULTIPLIER USING REDUNDANT FORM RECODING  
A multiplication method and a modular multiplier are provided. The multiplication method includes transforming a redundant-form multiplier by adding a recoding constant to the multiplier,...
US20130089201 AUTHENTICATION DEVICE, AUTHENTICATION METHOD, AND PROGRAM  
Provided is an authentication device including a key holding unit for holding L (L≧2) secret keys si (i=1 to L) and L public keys yi that satisfy yi=F(si) with respect to a set F of multivariate...
US20120308001 SECURE KEY CREATION  
Key creation includes sending a first public key part from a first system to a second system, receiving a second public key part sent by the second system to the first system and establishing a...
US20140140505 SYSTEM AND METHODS FOR GENERATING UNCLONABLE SECURITY KEYS IN INTEGRATED CIRCUITS  
A system and methods that generates a physical unclonable function (“PUF”) security key for an integrated circuit (“IC”) through use of equivalent resistance variations in the power distribution...
US20100329453 ROUNDING FOR SECURITY  
A system may generate from a first value, based on rounding information, a first security key that matches a second security key whenever the first value and a second value from which the second...
US20060050876 Integrated circuit with coded security signal, security process, corresponding security device and signal coded using a dynamic key  
An integrated circuit is provided, which comprises at least one security module, controlled by at least one security signal, the circuit being made at least partially inoperable if the security...
US20120063593 OBLIVIOUS TRANSFER WITH HIDDEN ACCESS CONTROL LISTS  
A method, apparatus, and a computer readable storage medium having computer readable instructions to carry out the steps of the method for anonymous access to a database. Each record of the...
US20110150213 WHITE-BOX IMPLEMENTATION  
A system for enabling a device to compute an outcome of an exponentiation Cx having a base C and/or an exponent x, the system comprising means for establishing a plurality of values λi; means for...
US20110258437 SECURE LOCAL UPDATE OF CONTENT MANAGEMENT SOFTWARE  
This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys...
US20140192976 METHOD AND SYSTEM FOR ID-BASED ENCRYPTION AND DECRYPTION  
Provided are identifier (ID)-based encryption and decryption methods and apparatuses for the methods. The ID-based encryption method includes having, at a transmitting terminal, a...
US20150215114 METHOD FOR GENERATING A SECURE CRYPTOGRAPHIC HASH FUNCTION  
A method for generating a secure cryptographic hash function supporting 256-512 bit digests is provided. A compression function based on a block cipher in the Davies-Meyer mode is used. A hash...