Match Document Document Title
9043827 Method and system for providing conditional access to encrypted content  
A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network....
9042543 Method for arbitrary-precision division or modular reduction  
A method in a portable data carrier for executing a cryptographic operation on security-relevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so...
9042551 Electronically programmable fuse security encryption  
A semiconductor structure including a device configured to receive an input data-word. The device including a logic structure configured to generate an encrypted data-word by encrypting the input...
9031228 Systems and methods for implementing block cipher algorithms on attacker-controlled systems  
Systems and methods for an implementation of block cipher algorithms (e.g., AES) use lookup tables to obscure key information, increasing difficulty of reverse engineering efforts. The...
9031230 Encryption processing device, encryption processing method, and program  
A reduction in the size of encryption processing configuration applying generalized Feistel structures is achieved. The encryption processing configuration applies a generalized Feistel structure...
9031227 Pattern-free encryption  
A method is described for defining a reserved pattern of symbols, receiving in a crypto-module an input stream including sequential input symbols, applying a cipher to the input stream in the...
9031234 Encryption device and decryption device  
According to one embodiment, an encryption device includes a storage unit, an input unit, first to fourth partial encryption units, a generation unit, and an output unit. The first partial...
9031229 Computer-implemented system and method for providing data privacy in a cloud using discrete homomorphic encryption  
A homomorphic encryption algorithm is performed that encrypts at least a portion of a plurality of plaintext data items at a client computing device into homomorphic queries, each query including...
9031239 Information processing apparatus, information processing method, and computer readable storage medium  
An information processing apparatus includes an encrypting unit that encrypts a value to be kept secret with a predetermined cipher key. The information processing apparatus includes a converting...
9031233 Method and storage device for protecting content  
A method for protecting content of a storage device including a memory for storing data and a controller for managing data input and output of the memory is provided, in which a Data Encryption...
9025765 Data security  
A system 100 for increasing data security comprises predetermined system data 104 to be protected. A cryptographic unit 108 is used for cryptographic processing of respective blocks of the content...
9027104 Instructions processors, methods, and systems to process secure hash algorithms  
A method of an aspect includes receiving an instruction. The instruction indicates a first source of a first packed data including state data elements ai, bi, ei, and fi for a current round (i) of...
9026803 Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms  
Described herein is a computing platform incorporating a trusted entity, which is controllable to perform cryptographic operations using selected ones of a plurality of cryptographic algorithms...
9021557 System and method for security using a sibling smart card  
A system and method for realizing specific security features for a mobile device that may store sensitive and private data by providing secured communications to a paired remote device. In this...
9021575 Selectively performing man in the middle decryption  
An agent on a device within a network receives a request to access a resource outside the network. A first encrypted connection is established between the device and the agent, and a second...
9020146 Algorithm agile programmable cryptographic processor  
A communication device includes at least one receiver and at least one transmitter. The communication device also includes a cryptographic processor coupled to at least one of the at least one...
9015858 Graphical user interface for seamless secure private collaboration  
Seamless, secure, private, collaborative file synchronization across trust boundaries, typically as a companion to a store and sync file service. Information needed to recover a file is stored...
9014370 High performance hardware-based execution unit for performing C2 block cipher encryption/decryption  
A system and method for encrypting and/or decrypting data with a Cryptomeria (C2) cipher may be provided that generates C2 round keys in parallel. Accordingly, data may be encrypted or decrypted...
9014368 Protection of a modular exponentiation calculation by addition of a random quantity  
A method for protecting a calculation, by an electronic circuit, of a modular exponentiation of a digital quantity, wherein: a first variable is initialized with a random quantity increased by...
9015816 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Key assignment for a brand
 
Systems and methods for providing secured network access are provided. A user device located within range of a branded hotspot initiates a request for the secured network access. The request...
9002002 Method and apparatus of high speed encryption and decryption  
A hardware architecture for encryption and decryption device can improve the encryption and decryption data rate by using parallel processing, and pipeline operation, and save footprint by sharing...
9002000 Method for conversion of a first encryption into a second encryption  
A method for converting, by means of a conversion entity, a first digit into a second digit, the first cipher corresponding to the result of a symmetric probabilistic encryption of an plain...
9001999 Updating stored passwords  
A device may include an authentication server and a server. The authentication server may receive a first form of a password from a client in accordance with an authentication protocol, and...
9001998 Data encryption and decryption method and apparatus  
This present application relates to data encryption and decryption technology, and especially relates to a data encryption and decryption method and apparatus. The described encryption method...
9002001 Prime field elliptic curve cryptography processor  
A system including a processor, a field addition circuit, and a field multiplication circuit. The processor is configured to execute instructions for performing elliptic curve operations on data....
8997192 System and method for securely provisioning and generating one-time-passwords in a remote device  
A secure processor such as a TPM generates one-time-passwords used to authenticate a communication device to a service provider. In some embodiments the TPM maintains one-time-password data and...
8995651 Multiple algorithm cryptography system  
A system includes an interface module, an addressing module, and a multiplier module. The interface module is configured to (i) receive operands and configuration data for a Rivest-Shamir-Adleman...
8997215 Authentication using multi-tier multi-class objects  
The invention provides a method and apparatus for authenticating a user in a touchscreen environment. A first tier may be defined having at least one object, and a destination tier may be defined...
8990576 Methods and apparatus for efficient computation of one-way chains in cryptographic applications  
Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of...
8983062 Encryption processing device, encryption processing method, and programme  
A cryptographic processing unit divides and inputs constituent bits of data to be subjected to data processing to lines, and repeatedly performs a data converting operation using round functions...
8983063 Method and system for high throughput blockwise independent encryption/decryption  
An encryption technique is disclosed for encrypting a plurality of data blocks of a data segment where the encryption selectively switches between a blockwise independent randomized (BIR)...
8983064 Strengthened public key protocol  
A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private...
8983061 Method and apparatus for cryptographically processing data  
A method and apparatus cryptographically process data including a plurality of data segments. The cryptographic process includes (a) receiving a plurality of data segments, (b) selecting, for each...
8983068 Masked nonlinear feedback shift register  
An NLFSR of length k, configured to output a sequence of masked values x′i=xi+mi according to a masked recurrence x′n+k=f(x′n, . . . , x′n+k−1), the NLFSR including a nonlinear feedback function...
8971528 Modified elliptic curve signature algorithm for message recovery  
A modified Chinese State Encryption Management Bureau's SM2 Elliptic Curve Signature Algorithm that offers partial message recovery and lowers the signature size for a given cryptographic...
8972715 Cryptographic hash function  
A first module divides a string into blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies...
8971527 Reliable physical unclonable function for device authentication  
A device having a physical unclonable function includes an integrated circuit and a phase change memory embedded in the integrated circuit and including a plurality of cells, where the phase...
8971525 Method, module and system for providing cipher data  
A method of providing cipher data during a period of time when output of a primary source of cipher data is unavailable is disclosed. The method comprises switching from a primary source of cipher...
8971526 Method of counter-measuring against side-channel attacks  
According to the present invention there is provided a method of counter-measuring against side channel attacks, the method comprising executing a block-cipher algorithm to mask intermediate...
8972742 System for secure image recognition  
Disclosed embodiments include methods, apparatuses, and systems for secured image processing, image recognition, biometric recognition, and face recognition in untrusted environments. The...
8966250 Appliance, system, method and corresponding software components for encrypting and processing data  
Disclosed is an appliance, system, method and corresponding software application for encrypting and processing data. A symbol based encryption module may be adapted to encrypt data on a symbol...
8966277 Method for authenticating an encryption of biometric data  
A method authenticates an encryption of a probe vector of biometric data based on an encryption of an enrollment vector of the biometric data using consistency of discriminative elements of the...
8964971 Method of providing text representation of a cryptographic value  
A method of representing crytographic values in text form is described. The text representation is formed from words selected from a vocabulary, which may include a collection of pseudowords. The...
8959365 Methods of providing fast search, analysis, and data retrieval of encrypted data without decryption  
Methods and systems of providing remote coded data storage, data analysis, and search and retrieval, with assurance of data security are described. Data security is such that it protects the data...
8958548 Generation of relative prime numbers for use in cryptography  
The disclosed technology generates two relative prime numbers and, then, using the relative prime numbers converts a super-increasing (SI) knapsack into a non-super increasing (NSI) knapsack. The...
8958551 Multi-dimensional montgomery ladders for elliptic curves  
An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in...
8958547 Generation of relative prime numbers for use in cryptography  
The disclosed technology generates two relative prime numbers and, then, using the relative prime numbers converts a super-increasing (SI) knapsack into a non-super-increasing (NSI) knapsack. The...
8958546 Steganographic messaging system using code invariants  
A steganographic method to prevent the execution of malicious code and mitigate software piracy. The method uses invariant portions of machine instructions to create an executable watermark within...
8958550 Encryption operation with real data rounds, dummy data rounds, and delay periods  
An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a...
8954752 Building and distributing secure object software  
A method and structure for enhancing protection for at least one of software and data being executed on a computer. A file to comprise a secure object is constructed, using a processor on a build...