Match Document Document Title
9083509 System and method of lawful access to secure communications  
The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a...
9043827 Method and system for providing conditional access to encrypted content  
A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network....
9037844 System and method for securely communicating with electronic meters  
An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link...
9032208 Communication terminal, communication system, communication method and communication program  
A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not...
9031227 Pattern-free encryption  
A method is described for defining a reserved pattern of symbols, receiving in a crypto-module an input stream including sequential input symbols, applying a cipher to the input stream in the...
9032221 Apparatus for logging a configuration of a microprocessor system and method for logging a configuration of a microprocessor system  
An apparatus includes a logging apparatus and a configuration apparatus. The logging apparatus has a security module operable to create a manipulation-proof log. The configuration apparatus is...
9026788 Managing credentials  
In a centralized credential management system, website credentials are stored in a vault storage at a vault. The website credentials are encrypted based upon a key not available to the vault and...
9025770 Dynamic encryption arrangement with a wireless device and methods therefor  
A method for encrypting a file using a combination of an electronic device and a protection communication-enabled (PCE) wireless device is provided. The method includes using an...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9020150 Differential uncloneable variability-based cryptography  
Differential uncloneable variability-based cryptography techniques are provided. The differential cryptography includes a hardware based public physically uncloneable function (PPUF) to perform...
9021463 Method, system and apparatus for management of push content  
A method, system and apparatus for management of push content is provided. An intermediation infrastructure mediates traffic from a push content server that is addressed to a computing device. The...
9020149 Protected storage for cryptographic materials  
Disclosed are various embodiments for obtaining a service request from a client, the service request including plaintext data to be encrypted and associated metadata. Ciphertext data is generated...
9008311 Method for encryption and decryption of messages  
A communication system that includes a sender computer and plurality of designated receiver computers coupled to the sender through a communication link. Each one of the receiver computers is...
9008312 System and method of creating and sending broadcast and multicast data  
A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of...
9008314 Secure wireless communications  
A system includes a sending access point and a receiving access point. The sending access point divides a data stream into sets of packets, encrypts a first set of packets using a first encryption...
9008313 System and method for generating random key stream cipher texts  
A system for generating random key stream cipher texts passes an unencrypted random key stream through an AES engine to produce encrypted cipher text having a first block size in a first frequency...
9002007 Efficient, remote, private tree-based classification using cryptographic techniques  
A method and apparatus are disclosed herein for classification. In one embodiment, the method comprises performing tree-based classification of a user input by a classifier with a classification...
9002008 System and method for dynamically allocating stream identifiers in a multi-encryption transport system  
The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a second stream depending upon the identifiers in a first stream. The first...
8997182 Legacy device registering method, data transferring method and legacy device authenticating method  
A method of registering a legacy device, a method of transferring data, and a method of authenticating a legacy device are provided. The method of registering a legacy device by using a virtual...
8995663 Method for implementing an encryption engine by smart key device  
Disclosed is a method for implementing an encryption engine, which includes: when an engine binding interface is called, a hardware encryption engine establishes a connection with a hardware...
8995650 Two non-orthogonal states quantum cryptography method and apparatus with intra- and inter-qubit interference for eavesdropper detection  
An apparatus and method for implementing a secure quantum cryptography system using two non-orthogonal states. For each qubit, the emitter station prepares a quantum system in one of two...
8995662 Secure vehicle-to-vehicle communication system  
Device, system and method, in a vehicle communication system, of securely storing safety-related messages. Embodiments include both digital signing and digital encryption such that (i) stored...
8990319 System and method for coordinating communication events using computer-assisted structured interaction  
A computer-implemented method for negotiating a time and a medium for communications between users is described. The method is performed at a server including one or more processors and memory...
8984287 Wireless personal area network access method based on primitive  
A wireless personal area network access method based on the primitive, includes: a coordinator broadcasts a beacon frame to the device which requests connecting to the wireless personal area...
8976963 IPv6-over-IPv4 architecture  
Mobile clients can execute IPv6 applications in an IPv4 environment without the need for any specialized IPv6 hardware or upgrades to the network infrastructure. The architecture provides a...
8978098 Centralized user authentication system apparatus and method  
An identification module receives a password request for a specified user and communicates an encrypted password field in response thereto, wherein the encrypted password field references a...
8976964 Key pair management method and image forming device  
In a key pair management method for use in an image forming device, one or more key pairs which are usable for secure communication between the image forming device and an external device are...
8971534 Mobile communication terminal and method  
A mobile communication terminal used in wideband code division multiple access (WCDMA) 3G mobile communication includes: a communication terminal unit configured to receive a short text message...
8972748 System and method for multi-tasking of a medical imaging system  
A medical imaging system capable of acquiring medical imaging data of a patient includes a console coupled to the system, the console comprising a computer programmed to enable a first user to...
8971533 Secure reset of personal and service provider information on mobile devices  
Systems and methods are described herein for supporting end users of a mobile device, such as a mobile phone, to reset a secure element associated with the communication device. The reset process...
8964981 Method and system for transmitting signaling information over a data transport network  
A method for transmitting signaling information, such as cryptographic key synchronization information, over a data path of a network, the data path having an originating end and a terminating...
8964985 Recovery from decryption errors in a sequence of communication packets  
A method in a receiver includes receiving from a transmitter a sequence of communication packets, which carry data encrypted with an encryption scheme. The encryption scheme depends on a counter...
8964984 Method for detecting a speed violation of a vehicle  
Detecting a speed violation of a vehicle traveling from a first roadside system to a second roadside system comprises: protecting evidence data collected at two roadside systems by encrypting each...
8964982 Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium  
A cryptographic communication technology that is based on predicate encryption and that can operate flexibly is provided. A conversion rule information pair is determined in advance, which has...
8966261 Method for secure remote backup  
The present invention is directed to an architecture and mechanism for securely backing up files and directories on a local machine onto untrusted servers over an insecure network.
8959604 System and method of verifying a number of a mobile terminal  
A client device is coupled with a server. The client device prompts a user to enter a number associated with a mobile device, which can be the client device, and generates data including a code....
8958560 Efficient multivariate signature generation  
A cryptographic method and apparatus, including providing a public key that defines a multivariate polynomial mapping Q( ) over a finite field F, extracting a first vector Y of verification values...
8959348 Methods establishing a symmetric encryption key and devices thereof  
The present invention is directed to a method for establishing a symmetric encryption key between a first device and a second device. The symmetric encryption key is a function of a phase...
8953788 Encrypting a data transmission using multiple channels  
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first algorithm; creating at least two subsets...
8953801 System and method for multicasting IPSEC protected communications  
A system and method is provided which allows multicast communications encrypted using IPSec protocol to be received by receivers in a network. In order to allow the receivers to receive the...
8953798 Enhanced cryptographically generated addresses for secure route optimization in mobile internet protocol  
Enhanced cryptographically generated addresses (ECGAs) for MIPv6 incorporate a built-in backward key chain and offer support to bind multiple logically-linked CGAs together. Enhanced CGAs may be...
8953803 Circuit switched mobile telephony in fixed wireless access  
A fixed wireless terminal (29) comprises interfaces (32, 34) and a controller (40), e.g., a Generic Access Network Controller (GANC). The controller (40) is configured to interwork Generic Access...
8953799 Mobile device management  
A device management method, is disclosed in which available features on a slave mobile device are managed (monitored or controlled) by a slave manager module commanded by a master device through...
RE45368 Communication apparatus and communication system  
A communication apparatus includes a reference signal generating section, a transmitting section, a propagation estimating section, a first data acquiring section, and a decoding section. The...
8949927 System and method for selection of security algorithms  
There is described a method and apparatus for managing security for a connection between a user device and a communications network comprising at least one base station and a core network. In one...
8949943 Messaging systems and methods  
A third-party can subscribe to one or more electronic message group lists without joining the group lists by creating a trust relationship between the subscriber and a group list member. In...
8949605 Communication system, communication apparatus, communication method, and computer program  
Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time. A content using apparatus...
8948387 Security key generator  
A communication system has a first and a second communicating device operable to send and receive data units through a communication channel. Some of the data are encrypted using a security key....
8943548 System and method for dynamic multifactor authentication  
A method of authenticating a user. The method comprises the step of sending an authentication request to a remote authentication device and generating a first piece of authentication information....
8943318 Secure messaging by key generation information transfer  
A system is configured to receive a first authentication request from a first device, authenticate the first device, establish a secure connection with the first device based on authenticating the...