Match Document Document Title
US20120237021 MULTI-DIMENSIONAL MONTGOMERY LADDERS FOR ELLIPTIC CURVES  
An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in...
US20140185796 Geographical Passwords  
An access credential based on geographical information. Users can select geographical locations (such as favorite places, mountains, trees, rivers or others) as their access credential to...
US20130077780 METHOD AND APPARATUS FOR FACILITATING EFFICIENT AUTHENTICATED ENCRYPTION  
In some embodiments, a key shared between communicating parties is mapped to a key variant using a block cipher. The key variant is mapped into a sequence of basis offsets using shifts and...
US20140050322 AUTHENTICATION IN A ROAMING ENVIRONMENT  
One embodiment of the invention provides a mobile communication network architecture that includes a first base station (e.g., a first base station controller and/or a first transceiver station),...
US20120237030 ELLIPTIC CURVE-BASED MESSAGE AUTHENTICATION CODE SYSTEM AND METHOD  
The elliptic curve-based message authentication code is a computational method for improving the security of existing message authentication code (MAC) generating methods through the use of...
US20130195269 METHODS AND SYSTEMS FOR SLOW ASSOCIATED CONTROL CHANNEL SIGNALING  
Methods and systems for slow associated control channel signaling are disclosed. An example method for securing communications in a mobile network disclosed herein comprises transmitting a first...
US20140040617 METHOD FOR THE GENERATION OF A CODE, AND METHOD AND SYSTEM FOR THE AUTHORIZATION OF AN OPERATION  
The present invention relates to a method for generating a code and a method comprising the authorization of an operation carried out by a client on a first server. A second server generating an...
US20110058672 MESSAGE DECIPHERING METHOD, SYSTEM AND ARTICLE  
A method for decrypting the encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device (ME). In one...
US20110216903 METHOD AND DEVICE FOR EMITTING MESSAGES FOR GUARANTEEING THE AUTHENTICITY OF A SYSTEM AND METHOD AND DEVICE FOR VERIFYING THE AUTHENTICITY OF SUCH A SYSTEM  
The invention relates to a method for emitting messages in order to guarantee the authenticity of the system that emitted said messages. The method includes the following steps, namely: a step...
US20140205085 PREVENTING PATTERN RECOGNITION IN ELECTRONIC CODE BOOK ENCRYPTION  
In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book...
US20110099377 COMPACT SECURITY DEVICE WITH TRANSACTION RISK LEVEL APPROVAL CAPABILITY  
The present invention relates to the field of securing electronic transactions and more specifically to methods to indicate and verify the approval of the risk level of a transaction and to...
US20110069837 METHOD OF TRANSMITTING USER MESSAGE, TERMINAL AND BASE STATION USING THE METHOD  
When transmitting a user message, in a call setting period of a base station and a terminal and a radio connection state between a base station and a terminal, whenever a data transmittable...
US20110123024 ROLLBACK ATTACK PREVENTION SYSTEM AND METHOD  
A rollback attack prevention system 10 for a gaming machine 20 includes a configuration log 30 and a revocation list 40. Preferably, the configuration log 30 includes a protected record of...
US20120033814 SHORT MESSAGE SERVICE CIPHER  
A wireless phone system and methods performed thereon for cryptographically processing SMS messages is disclosed. A cryptographic pad is used to replace characters in a payload of a SMS message...
US20120002810 SHORT MESSAGE SERVICE CIPHER  
A wireless phone system and methods performed thereon for cryptographically processing SMS messages is disclosed. A cryptographic pad is used to replace characters in a payload of a SMS message...
US20130148809 COMPUTING THE ETH ROOT OF A NUMBER USING A VARIANT OF THE RSA ALGORITHM (FOR EVEN E'S)  
An Eth root unit is configured to compute an Eth root of a number A with a machine. The Eth root unit locates a value E, which is even, in a first entry of a plurality of entries of a structure....
US20120213365 SYSTEM AND METHOD FOR PROCESSING ATTACHMENTS TO MESSAGES SENT TO A MOBILE DEVICE  
A system and method for processing attachments to messages sent to a mobile device is described herein. Embodiments described herein apply to encrypted messages comprising multiple message parts,...
US20100298662 SYSTEM AND METHOD FOR AUTOMATED DATA COLLECTION OF TWENTY-FOUR HOUR ULTRAFILTRATION AND OTHER PATIENT PARAMETERS USING WIRED OR WIRELESS TECHNOLOGY  
A dialysis system includes: a dialysis machine for performing a first dialysis session on a patient at a first time of a day; a remote exchange device for performing a second dialysis session on...
US20120281829 REMOTE DIGITAL FIRING SYSTEM  
A remote digital firing system for selectively firing a plurality of remote mission payloads. The remote digital firing system includes a first set of firing circuits communicatively coupled to...
US20120275592 DECOUPLING RIGHTS IN A DIGITAL CONTENT UNIT FROM DOWNLOAD  
Systems and methods for enabling a user to obtain rights in a legitimate copy of a digital content unit without downloading the copy from a digital content store are provided. The systems and...
US20140098951 METHOD FOR ELLIPTIC CURVE CRYPTOGRAPHY WITH COUNTERMEASURES AGAINST SIMPLE POWER ANALYSIS AND FAULT INJECTION ANALYSIS AND SYSTEM THEREOF  
There are provided a method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis, and a system thereof. According to an aspect, there is...
US20130279691 Secure Key Authentication and Ladder System  
Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key...
US20100296649 CRYPTOGRAPHIC PROCESSING OF CONTENT  
A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and...
US20120087501 SYSTEMS AND METHODS FOR RFID SECURITY  
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption...
US20110228941 SYSTEMS AND METHODS FOR RFID SECURITY  
An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption...
US20110013767 MASKING METHOD OF DEFENDING DIFFERENTIAL POWER ANALYSIS ATTACK IN SEED ENCRYPTION ALGORITHM  
A plurality of S-boxes is masked by one masking inverse table. Therefore, the computation cost and the use amount of the RAM necessary for masking at the time of a masking operation for defending...
US20150023495 CHANGE-TOLERANT METHOD FOR GENERATING IDENTIFIER FOR COLLECTION OF ASSETS IN COMPUTING ENVIRONMENT USING ERROR-CORRECTION CODE SCHEME  
A secure and change-tolerant method for obtaining an identifier for a collection of assets associated with a computing environment. Each asset has an asset parameter and the computing environment...
US20120328103 Method and System for Managing Air Interface Key  
A method and system for managing an air interface key are provided in the present invention, which relate to the communication field; the method including: a serving GPRS Support Node+ (SGSN+) or...
US20140133653 Timeslot Encryption in an Optical Transport Network  
An Optical Transport Network (OTN) frame comprises an optical channel payload unit that is divided into a plurality of timeslots. This OTN frame is received at a transmitter and the timeslots are...
US20150139422 METHOD AND APPARATUS FOR PROVIDING BROADCAST CHANNEL ENCRYPTION TO ENHANCE CELLULAR NETWORK SECURITY  
A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast...
US20110246764 USER AUTHENTICATION SYSTEM  
An ID vault computer control program detects when a user's browser navigates to a third-party website that requires a user ID and password. If it hasn't done so already, it automatically requests...
US20120314862 SYSTEM AND METHOD FOR AN ATM ELECTRONIC LOCK SYSTEM  
A method for ATM Electronic Lock System comprising the steps: (a) a user using ATM card and entering PIN in an ATM Electronic Lock Subsystem, (b) the ATM Lock System authenticating the user, (c)...
US20140105387 LEVEL-TWO DECRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20100310078 SYSTEM FOR USER-CENTRIC IDENTITY MANAGEMENT AND METHOD THEREOF  
A user terminal for a user-centric identity management system includes: a browser that requests a service to the service provider server and receives a service parameter in which a plurality of...
US20140105401 LEVEL-ONE ENCRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20140105391 LEVEL-ONE ENCRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20140105389 LEVEL-TWO ENCRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20140105388 LEVEL-TWO ENCRYPTION ASSOCIATED WITH INDIVIDUAL PRIVACY AND PUBLIC SAFETY PROTECTION VIA DOUBLE ENCRYPTED LOCK BOX  
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or...
US20100329451 Cipher Implementation  
At least one of a keystream and a message authentication code are generated with a partial KASUMI block cipher, without utilizing a full KASUMI block cipher.
US20150264562 CONNECTION MODIFICATION METHOD APPLICABLE TO USER EQUIPMENT AND BASE STATION  
The disclosure is directed to a connection modification method in a dual connectivity scenario. In one of the exemplary embodiments, a UE configures a first MCG bearer for communication with a...
US20120011502 MANAGING UNIQUE ELECTRONIC IDENTIFICATION FOR KERNEL EXTENSIONS IN ISOLATED VIRTUAL SPACE  
Some embodiments of the inventive subject matter are directed to detecting a file that a first instance of an operating system is configured to load where the file is configured to extend...
US20100262545 SYSTEMS AND METHODS FOR CONSTRUCTING A LOCAL ELECTRONIC MEDICAL RECORD DATA STORE USING A REMOTE PERSONAL HEALTH RECORD SERVER  
Certain embodiments of the present invention provide systems and methods for managing medical information. Certain embodiments provide a local electronic medical record system including a local...
US20130236012 Public Key Cryptographic Methods and Systems  
Methods and systems are disclosed for improving public key cryptography schemes, such as RSA and its variants, to allow for decryption of messages using less than all of the prime factors of the...
US20130016834 SECURITY COUNTERMEASURES FOR POWER ANALYSIS ATTACKS  
A countermeasure for differential power analysis attacks on computing devices. The countermeasure includes the definition of a set of split mask values. The split mask values are applied to a key...
US20110064225 SECURITY COUNTERMEASURE FOR POWER ANALYSIS ATTACKS  
A countermeasure for differential power analysis attacks on computing devices. The countermeasure includes the definition of a set of split mask values. The split mask values are applied to a key...
US20110170684 DETERMINATION OF PAIRINGS ON A CURVE USING AGGREGATED INVERSIONS  
One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the...
US20130322616 CRYPTIC NOTES AND RELATED APPARATUS AND METHODS  
A computer-implemented method is described. A message is received from a user via a user interface of a computer device. The message includes at least first and second portions. A virtual cryptic...
US20120039464 Emergency call-based security algorithm negotiation method and apparatus  
An emergency call-based security algorithm negotiation method and apparatus are disclosed. The method comprises the following steps: after receiving an attachment request from a User Equipment...
US20110072262 System and Method for Identifying Security Breach Attempts of a Website  
The present invention is a method, circuit and system for detecting, reporting and preventing an attempted security breach of a commercial website (for example a banking website), such as identity...
US20140153718 Trusted Communications Between Untrusting Parties  
A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for...