Matches 1 - 50 out of 308 1 2 3 4 5 6 7 >


Match Document Document Title
US20140056425 One Pad Communications  
Perfect secrecy can only be assumed if the length of the key is as long the message sent and the cardinality of the key space is the same as that of the message. The preferred embodiment will...
US20120288090 APPARATUS AND METHOD FOR COMMUNICATION SECURITY IN A NATIONWIDE WIRELESS NETWORK USING WIRELESS ROUTERS  
Systems and methods for security in a nationwide wireless network with geographically dispersed wireless routers are described. The wireless routers have an interface function with an ability to...
US20150222431 RANDOM IDENTIFIER GENERATION FOR OFFLINE DATABASE  
Various embodiments of the present technology involve creating a secure unique identifier for a content item to be used in a synchronized content management system while off-line with the...
US20110243331 SHARED RANDOM NUMBERS MANAGEMENT METHOD AND MANAGEMENT SYSTEM IN SECRET COMMUNICATION NETWORK  
In a secret communication network including a center node and multiple remote nodes, the center node is provided with a virtual remote node which functions as a remote node similar to each of the...
US20150124963 AUTHENTICATION  
A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second...
US20090199016 Storage system, and encryption key management method and encryption key management program thereof  
A user no longer needs to restore key information upon restoring data. Proposed is a storage system having a storage apparatus, a tape library apparatus for backing up data stored in the storage...
US20100332829 Method for detecting the use of a cloned user unit communicating with a server  
A method to prevent, detect and fight against cloning attacks by using payload keys to encrypt request and response messages exchanged between user units and server. In an initialization phase,...
US20060018466 Attack correlation using marked information  
Techniques are described for providing security to a protected network. Techniques are described for thwarting attempted network attacks using marked information. The attack correlation system...
US20120033810 AUTHENTICATION OF INTEGRATED CIRCUITS  
A group of devices are fabricated based on a common design, each device having a corresponding plurality of measurable characteristics that is unique in the group to that device, each device...
US20130129088 METHOD AND SYSTEM FOR GENERATING UNPREDICTABLE PSEUDO-RANDOM NUMBERS  
The invention relates to a system for generating unpredictable pseudorandom numbers in a chaotic manner, comprising discrete chaotic map processing means and an XOR gate for generating...
US20090080651 SEMICONDUCTOR WITH HARDWARE LOCKED INTELLECTUAL PROPERTY AND RELATED METHODS  
A computer readable medium includes executable instructions to describe an intellectual property core with a key check mechanism configured to compare an external key with an internal key in...
US20140369498 ONE-TIME-PAD ENCRYPTION WITH CENTRAL KEY SERVICE  
A one-time-pad encryption system where encrypted one-time-pad keys can be distributed to users on physical media or on a computer network from a central server. Each one-time-pad key has a key...
US20120087494 METHOD FOR PROVIDING CRYPTOGRAPHICAL KEY PAIRS  
The invention relates to a method for creating a second asymmetric cryptographic pair of keys (206), wherein a first private key (G0, 154) together with a first public key (O0, 126) forms a first...
US20150207632 Random Number Generation Failure Detection and Entropy Estimation  
In accordance with one or more aspects, an initial output string is generated by a random number generator. The initial output string is sent to a random number service, and an indication of...
US20140241525 RANDOM NUMBER GENERATOR BASED WIRELESS TRANSMISSION ENCODING CONTROL METHODOLOGY  
The present invention relates to an algorithm methodology control means for creating esoteric unique encrypted key coding generation, by a random number generator means, for wireless transmitter...
US20110026716 Method And System For On-Screen Authentication Using Secret Visual Message  
A method of authenticating a user includes providing a user key to an authentication authority, providing a transmission message from the authentication authority in response to the user key,...
US20140321645 APPARATUS AND METHOD FOR CONVERTING RANDOM BINARY SEQUENCE INTO RANDOM INTEGER  
An apparatus and method for converting a random binary sequence into a random integer is provided. The present invention converts a random binary sequence into a random integer, and determines...
US20120328098 SYSTEM AND METHOD FOR GENERATING SESSION KEYS  
The present disclosure describes systems and methods of generating a cryptographic session key based on a known master key shared between a sender communicator and a receiver communicator in a...
US20070165848 Lightweight pseudo-random number generator  
A computer implemented method, data processing system, and computer usable code are provided for generating random numbers. The aspects of the present invention receive a request for a number of...
US20110274273 Generation of registration codes, keys and passcodes using non-determinism  
In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured...
US20100284539 Methods for Protecting Against Piracy of Integrated Circuits  
Techniques are provided for reducing the likelihood of piracy of integrated circuit design using combinational circuit locking system and activation protocol based on public-key cryptography....
US20070140485 Method and circuit for generating random numbers, and computer program product therefor  
A random number generator uses the output of a true random generator to alter the behavior of a pseudo-random number generator. The alteration is performed by a mixing logic that builds a random...
US20110211692 Secure Computation Using a Server Module  
A server module evaluates a circuit based on concealed inputs provided by respective participant modules, to provide a concealed output. By virtue of this approach, no party to the transaction...
US20120093310 APPARATUS AND METHOD THAT GENERATES ORIGINALITY VERIFICATION AND VERIFIES ORIGINALITY VERIFICATION  
Provided is an apparatus and method that may generate and verify an originality verification (OV). An OV generating apparatus may generate primary information that is based on generator...
US20110167270 SECURE KEY AUTHENTICATION METHOD FOR COMMUNICATION NETWORK  
A key authentication method between a user equipment (UE) and a serving network (SN) for binary CDMA network and a key re-authentication method during which the UE performs a handover within the...
US20110268270 Method of Public Key Generation  
A potential bias in the generation of a private key is avoided by selecting the key and comparing it against the system parameters. If a predetermined condition is attained it is accepted. If not...
US20120030467 METHODS AND SYSTEMS FOR FACILITATING COMMUNICATIONS BETWEEN VEHICLES AND SERVICE PROVIDERS  
Methods and systems for facilitating communications between a vehicle and a service provider are provided. A first address of a vehicle communication device and a second address of a service...
US20100017614 ENCODING AND DETECTING APPARATUS  
An encoding data processing apparatus generates a video material item marked copy by embedding a payload data word into the video material item. The video material item includes plural video...
US20140294177 IDENTITY BASED PUBLIC KEY CRYPTOSYSTEM  
A method for generating cryptographic parameters comprises generating a private_IGTABLE based on an Euler totient function of a composite number (φ(n)), where the private_IGTABLE includes a...
US20080031447 SYSTEMS AND METHODS FOR AGGREGATION OF ACCESS TO NETWORK PRODUCTS AND SERVICES  
The present invention is directed to a method and computer system for access aggregation comprising the storage and retrieval of website userids and passwords, and potentially other information,...
US20130195267 PUBLIC KEY ENCRYPTION SYSTEM BASED ON THE QUADRATIC RESIDUOSITY ASSUMPTION  
A public-key encryption system. Encryption of a k-bit plaintext m is performed by picking a random generating ciphertext and outputting the ciphertext. N is a non-prime integer (preferably the...
US20060153376 Enhanced ANSI X9.17 and FIPS 186 pseudorandom number generators with forward security  
Disclosed herein are apparatuses and methods for generating pseudorandom numbers by making the existing ANSI and FIPS PRNGs forward secure and eliminating the need for re-keying them. A forward...
US20100228990 Using Hidden Secrets and Token Devices to Create Secure Volumes  
A system for encrypting Secure Volumes using an encryption key which is saved in the open after being encoded inside a hardware token device utilizing a secure secret which is stored inside the...
US20110302410 SECURE DOCUMENT DELIVERY  
A method, machine-readable medium, and server to create a key, set an expiration event for the key to expire, send the key to a first client device to encrypt the document, authenticate a second...
US20100272256 Method and Implementation for Information Exchange Using Markov Models  
The replacement of secret keys is a central problem in key management. Typical solutions exchange handshaking messages, involve complex computations, or require the cooperation of trusted third...
US20120281827 Pseudo-random Number Generation Based on Periodic Sampling of One or More Linear Feedback Shift Registers  
Disclosed are various embodiments for generating pseudo-random numbers. One such embodiment is an apparatus comprising digital hardware configured to generate pseudo-random numbers. The apparatus...
US20150163056 Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication  
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a...
US20090304181 Method for generating and/or imprinting a retrievable cryptographic key during the production of a topographic structure  
The present invention relates to a method for generating and imprinting a retrievable cryptographic key during the fabrication of a topographic structure, in particular for microelectronic or...
US20150110268 METHOD FOR CODING AND DECODING INFORMATION ASSOCIATED WITH AN ITEM  
A method for coding and decoding information (10) associated with an item includes the steps of coding the information (10) associated with the item through an encryption key (20) and a first...
US20100135487 BUNDLE AUTHENTICATION SYSTEM AND METHOD  
There is provided a bundle authentication system and method that can perform network access authentication and authentication at a service request in a next generation network utilizing a Bundled...
US20060161969 Method for generating and managing a local area network  
The present invention relates to a method for creating and managing a local area network including at least one device for reproducing an encrypted data flow and a device for transmitting and...
US20060236112 Watermark information embedding device and method, watermark information detecting device and method, watermarked document  
The present invention is relate to watermark information embedding apparatus and method for the same, watermark information detecting apparatus and method for the same, and method of containing...
US20100067702 KEY GENERATION DEVICE, ENCRYPTION DEVICE, RECEPTION DEVICE, KEY GENERATION METHOD, KEY PROCESSING METHOD, AND PROGRAM  
A key generation device according to the present invention hierarchically constructs a Y-ary tree structure where n reception devices are assigned to leaves, and forms subgroups where individual...
US20120051538 APPENDING PSEUDO-RANDOM SUB-LSB VALUES TO PREVENT INTENSITY BANDING  
Embodiments of the present invention provide a test and measurement instrument that displays acquired data on a logarithmic scale without intensity banding. The test and measurement instrument...
US20100070769 LOG ACQUISITION SYSTEM, LOG COLLECTION TERMINAL, LOG ACQUISITION TERMINAL, AND LOG ACQUISITION METHOD AND PROGRAM USING THE SAME SYSTEM AND TERMINALS  
In a log acquisition system comprising a log collection terminal for collecting log data and a log acquisition terminal for acquiring the log data collected by the log collection terminal from the...
US20080063193 CRYPTO-COMMUNICATION METHOD, RECIPIENT-SIDE DEVICE, KEY MANAGEMENT CENTER-SIDE DEVICE AND PROGRAM  
A public key encryption system and an ID-based encryption system are provided, each exhibiting high security and having a tight security reduction, in which a BDH problem is a cryptographic...
US20120148041 USER-CONTROLLED RANDOM-ID GENERATION FUNCTION FOR SMARTCARDS  
A smartcard having a microcontroller kernel and a non-secure memory capable of storing a Random-ID code, where the non-secure memory is electrically coupled to the microcontroller kernel. A random...
US20150156019 Elliptic Curve Random Number Generation  
An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The...
US20100104097 SYSTEM AND METHOD FOR UCC CONTENTS PROTECTION  
The present invention relates to a user created contents protection system and method. Copyright protection for protecting contents on user created contents is performed by using a contents upload...
US20140192979 Method and Apparatus for Generating Large Numbers of Encryption Keys  
Entropy obtained from a series of key generation exchanges may be combined with entropy from a strong entropy source to allow the strong entropy to be stretched to generate a larger number of keys...

Matches 1 - 50 out of 308 1 2 3 4 5 6 7 >