Matches 1 - 50 out of 200 1 2 3 4 >


Match Document Document Title
9042554 Methods, apparatus, and articles of manufacture to encode auxilary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data  
Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9009479 Cryptographic techniques for a communications network  
Techniques are described for enabling authentication and/or key agreement between communications network stations and service networks. The techniques described include the negotiation and use of...
8964989 Method for adding nodes to a quantum key distribution system  
An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can...
8958555 Fast computation of a single coefficient in an inverse polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
8959333 Method and system for providing a mesh key  
Method for providing a mesh key which can be used to encrypt messages between a first node and a second node of a mesh network, wherein a session key is generated when authenticating the first...
8953794 Apparatus and method for securing beacons  
A short-range communication tag includes a transmitter, a clock circuit providing a clock value and a memory containing a unique identification value. The tag further includes a processor which...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8929542 Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program  
It is an object of this invention to implement a predicate encryption scheme with delegation capability. A cryptographic process is performed using dual vector spaces (dual distortion vector...
8931084 Methods and systems for scripting defense  
Methods and systems for cross-site scripting (XSS) defense are described herein. An embodiment includes, embedding one or more tags in content at a server to identify executable and non-executable...
8862867 Method and system for protecting security of the third layer mobility user plane data in NGN  
The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing authentication by a terminal with an...
8848922 Distributed encryption key management  
Secure information is managed for each host or machine in an electronic environment using a series of key identifiers that each represent one or more secure keys, passwords, or other secure...
8848923 Key distribution scheme for networks of information  
A method for control ling information object (102) usage in a network of information (100) wherein information objects (102) are identified by information object identities and locations of the...
8832429 Smart grid and method for operating a smart grid  
Method for operating a smart grid including a plurality of smart meters configured to monitor at least one physical measured quantity and to provide measurement results of the at least one...
8812848 Method, system and device for negotiating security capability when terminal moves  
A method, user equipment (UE) and system are provided for negotiating a security capability during idle state mobility of the UE from a non-long term evolution (non-LTE) network to a long term...
8787578 Method and apparatus for encrypting transmissions in a communication system  
Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3 so that separate encryption elements can be assigned to separate types of transmission traffic,...
8789172 Methods, media, and systems for detecting attack on a digital processing device  
Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether...
8788811 Server-side key generation for non-token clients  
A method and system for server-side key generation for non-token clients is described.
8787573 Cipher communication method and apparatus for the same  
A cipher communication method for an encryption apparatus an includes: receiving a second encryption key while performing a cipher communication using a first encryption key; storing encryption...
8713321 Method and apparatus for verifiable generation of public keys  
The invention provides a method of verifiable generation of public keys. According to the method, a self-signed signature is first generated and then used as input to the generation of a pair of...
8687813 Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices  
Disclosed are methods, circuit, devices and systems for provisioning cryptographic material to a target device. According to embodiments, a cryptographic material provisioning (CMP) module may be...
8677140 Delivery point validation system  
A computer-implemented method represents a list of informational items using a bit array. The method converts an informational item to a cryptographic value using a cryptographic algorithm and...
8656159 Versioning of modifiable encrypted documents  
In some embodiments, a method includes receiving a modifiable electronic document. The method includes generating a new version of the modifiable electronic document. The method also includes...
8646042 Hybrid device having a personal digital key and receiver-decoder circuit and methods of use  
A hybrid device includes a personal digital key (PDK) and a receiver-decoder circuit (RDC). In one embodiment, the hybrid device also provides a physical interconnect for connecting to other...
8638939 User authentication on an electronic device  
The present disclosure provides for the use of non-alphanumeric, non-biometric inputs to authenticate a user accessing secured data or functions on an electronic device. In one embodiment, an...
8634561 Secure key management  
A system for implementing secure key management is provided. The system includes a computer processor and an application configured to execute on the computer processor, the application...
8630416 Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications  
Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key...
8594335 Key verification system and method  
A method, computer program product, and data storage system for associating an encryption key with each of a plurality of storage objects within a data storage system, thus defining a plurality of...
8577030 Cryptographic processing system, key generation device, key delegation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program  
It is an object of this invention to implement a predicate encryption scheme with delegation capability. A cryptographic process is performed using dual vector spaces (dual distortion vector...
8549321 IC chip, board, information processing equipment and storage medium  
An IC chip, a board, information processing equipment, and a storage medium are provided that can prevent, even when information is transferred between a plurality of programs, leaking of the...
8549301 Method and computer system for ensuring authenticity of an electronic transaction  
At least one embodiment of the present invention relates to a method for ensuring authenticity of an electronic transaction performed during a transaction session. The method includes receiving,...
8548171 Pair-wise keying for tunneled virtual private networks  
In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an attacker who compromises one of the...
8548163 Simultaneous scalar multiplication method  
In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in...
8542593 System and methods for error tolerant content delivery over multicast channels  
In one embodiment of the invention, a system and method for error tolerant delivery of data is provided. A data file is received for transmission which includes metadata and data. The metadata...
8532303 Symmetric key distribution framework for the internet  
A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health...
8532289 Fast computation of a single coefficient in an inverse polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
8510552 System and method for file-level data protection  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a...
8498420 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Symmetric key distribution framework for the internet
 
A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health...
8488793 Efficient rebinding of partitioned content encrypted using broadcast encryption  
Provided is a method for rendering media content wherein a request to render a first media content stored in a first partition is received, wherein the first partition stores the first and a...
8484469 Method, system and equipment for key distribution  
A method, system and equipment for key distribution are disclosed. During the course of computing a shared key Kab between a client node and a third party equipment, a serial number is introduced...
8478995 Method of encrypting and transferring data between a sender and a receiver using a network  
A method of encrypting and transferring data between a sender and a receiver using a network thereby transferring data in a secure manner includes the steps of a server receiving from the sender...
8437739 Method and apparatus for generating a cryptosync  
A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The...
8412948 Method and apparatus for digital signature generation and validation  
An apparatus and method are provided for reducing time taken for generating a digital signature and generating the digital signature using a minimum number of operations using at least two secret...
8397083 System and method for efficiently deleting a file from secure storage served by a storage system  
A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a plurality of files, each of which stores...
8384412 Circuit personalization  
A method distributes personalized circuits to one or more parties. The method distributes a generic circuit to each party, encrypts a unique personalization value using a secret encryption key,...
8369527 Access control over multicast  
A multicast host for communicating information published about any one of a set of topics to one or more authorised subscribers to those topics, the set of topics being partitioned into one or...
8345877 Key management system  
In a transmitter, data is encrypted by use of a data key, the data key is encrypted based on a first modification key, and the first modification key is encrypted based on a second modification...
8332922 Transferable restricted security tokens  
In a web-based service environment, third party providers need to have varying degrees of access to user data for their complementary services. To prevent third party providers from having broader...
8332633 Encryption processing for streaming media  
A method of securing transmission of streaming media by encrypting each packet in the stream with a packet key using a fast encryption algorithm. The packet key is a hash of the packet tag value...
8327146 Wireless communication using compact certificates  
A method and communications system for generating and using compact digital certificates for secure wireless communication. Each compact certificate includes a digital signature and only a portion...

Matches 1 - 50 out of 200 1 2 3 4 >