Match Document Document Title
9036818 Private key generation apparatus and method, and storage media storing programs for executing the methods  
Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root...
9031230 Encryption processing device, encryption processing method, and program  
A reduction in the size of encryption processing configuration applying generalized Feistel structures is achieved. The encryption processing configuration applies a generalized Feistel structure...
9031229 Computer-implemented system and method for providing data privacy in a cloud using discrete homomorphic encryption  
A homomorphic encryption algorithm is performed that encrypts at least a portion of a plurality of plaintext data items at a client computing device into homomorphic queries, each query including...
9032220 System and method for remote reset of password and encryption key  
Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may...
9025767 Method and apparatus for querying content protected by identity-based encryption  
An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at...
9026803 Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms  
Described herein is a computing platform incorporating a trusted entity, which is controllable to perform cryptographic operations using selected ones of a plurality of cryptographic algorithms...
9021135 System and method for tokenization of data for storage in a cloud  
An intercepting proxy server processes traffic between an enterprise user and a cloud application. The intercepting proxy server provides interception of real data elements in communications from...
9009858 Systems and methods for providing and managing distributed enclaves  
A method for operating a distributed data management and control enclave comprises providing a policy that identifies a set of data to be managed and controlled. The policy further identifies...
8997239 Detecting code injections through cryptographic methods  
Code injection is detected based on code digests associated with hashes of selected portions of content supplied to clients by a server. A client receives the content and generates a corresponding...
8995651 Multiple algorithm cryptography system  
A system includes an interface module, an addressing module, and a multiplier module. The interface module is configured to (i) receive operands and configuration data for a Rivest-Shamir-Adleman...
8997215 Authentication using multi-tier multi-class objects  
The invention provides a method and apparatus for authenticating a user in a touchscreen environment. A first tier may be defined having at least one object, and a destination tier may be defined...
8988713 Secure printing in a cloud-based print system  
The embodiments provide a printing system including an application manager, implemented at a cloud print server, configured to receive a print job including encrypted content to be printed by a...
8983064 Strengthened public key protocol  
A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private...
8983071 Key management method using hierarchical node topology, and method of registering and deregistering user using the same  
A key management, user registration and deregistration for a digital rights management (DRM) system in a home network, using a hierarchical node topology. In the key management, node information...
8976008 Cross-domain collaborative systems and methods  
The present disclosure relates to systems and methods for secure and authentic electronic cross domain collaboration between a plurality of users using a combination of biometric security, a...
8971528 Modified elliptic curve signature algorithm for message recovery  
A modified Chinese State Encryption Management Bureau's SM2 Elliptic Curve Signature Algorithm that offers partial message recovery and lowers the signature size for a given cryptographic...
8972300 Content distribution system  
A transmission device including: copy unit that extracts part or all of partial contents, as tracking information, from a content, and copies the extracted tracking information, thereby generating...
8959355 Authentication device, authentication method, program, and signature generation device  
Provided is an authentication device including a key setting unit for setting sεKn to a secret key and setting a multi-order polynomial fi(xl, . . . , xn) (i=1 to m) on a ring K and yi=fi(s) to a...
8958555 Fast computation of a single coefficient in an inverse polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
8958552 Data processing device  
A certification device 101 encrypts a feature vector for registration by using a random number and a public key which is set to correspond to a secret key in a decryption device 103. The encrypted...
8958553 Public key cryptosystem based on goppa codes and puf based random generation  
This invention provides improved security of the McEliece Public Key encryption system adding features which make full use of random number generation for given message and cryptogram parameters,...
8958563 Method of generating a public key for an electronic device and electronic device  
A method for generating a public key for an electronic device is provided, wherein the method comprises generating a public key 103 based on a private key and a unique identifier associated with...
8958551 Multi-dimensional montgomery ladders for elliptic curves  
An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in...
8954752 Building and distributing secure object software  
A method and structure for enhancing protection for at least one of software and data being executed on a computer. A file to comprise a secure object is constructed, using a processor on a build...
8953787 Strengthened public key protocol  
A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8948388 Elliptic curve random number generation  
An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The...
8948381 Conditional key generation based on expiration date of data  
In one embodiment, receive a first request in connection with accessing a set of encrypted data, wherein the set of encrypted data has an expiration date; the first request comprises a first key...
8948401 Method for filtering of abnormal ONT with same serial number in a GPON system  
Disclosed is a method of registering only an authorized optical network terminal among a plurality of optical network terminals with the same serial number, in an optical line terminal, using a...
8949609 Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor  
The user device includes: a recording unit which stores system parameters as respective parameters given in advance, a disclosure public key, a user public key, a user private key, a member...
8949967 Information management apparatus, information management method, and non-transitory computer-readable storage medium  
An information management apparatus includes a first control information setting unit that sets first control information for permitting use of information within a destination terminal to the...
8938615 System and method for authenticating radio frequency identification (RFID) tags  
An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such...
8935750 System and method for restricting pathways to harmful hosts in computer networks  
System and methods for restricting accessibility to harmful content on a computer network. Network pathways are explored to study a plurality of investigated hosts from a plurality of diverse...
8934609 Method and apparatus for identifying and monitoring VoIP media plane security keys for service provider lawful intercept use  
A mechanism is described that enables encrypted end-point communications in a VoIP network to be accessed by a service provider. The mechanism includes a session information retrieval component...
8934631 Decompressing apparatus and compressing apparatus  
According to one embodiment, a decompressing apparatus includes an input unit, a calculating unit, a first selecting unit, and a decompressing unit. The input unit inputs additional data, which is...
8930687 Secure distributed deduplication in encrypted data storage  
In an encrypted storage system employing data deduplication, encrypted data units are stored with the respective keyed data digests. A secure equivalence process is performed to determine whether...
8929553 Using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects  
A method and system for generating data for use in generating an authenticity certificate. A request is received for a step certificate that authenticates an involvement of the requester entity...
8924738 Information processing device, content processing system, and computer readable medium having content processing program  
An information processing device and method include storing encrypted content, storing a key for decrypting the encrypted content stored, decrypting the encrypted content stored using the key,...
8924717 Information processing apparatus, information processing method, and computer program  
An information processing apparatus and method that prior to using a digital certification considers a validity expiration date of the digital certificate as well as a usable deadline of an...
8925075 Method for protecting data used in cloud computing with homomorphic encryption  
A method for protection of cloud computing includes homomorphic encryption of data. Partially or fully homomorphic encryption allows for data within the cloud to be processed without decryption. A...
8913739 Method for scalar multiplication in elliptic curve groups over prime fields for side-channel attack resistant cryptosystems  
A method and device for transforming data with a secret parameter in an elliptic curve cryptosystem based on an elliptic curve defined over an underlying prime field, includes multiplying a point...
8909929 Stored public key validity registers for cryptographic devices and systems  
Systems and techniques for performing cryptographic operations based on public key validity registers are described. A described system includes a controller and a memory structure to store one or...
8908866 Method and apparatus to provide authentication and privacy with low complexity devices  
A method and apparatus to provide a cryptographic protocol for secure authentication, privacy, and anonymity. The protocol, in one embodiment, is designed to be implemented in a small number of...
8904036 System and method for electronic secure geo-location obscurity network  
Described are a secure geo-location obscurity network and ingress nodes, transit nodes and egress nodes used in such a network. In particular, a novel device is provided and comprises: a node for...
8903090 Securely classifying data  
Techniques are disclosed for securely classifying or decoding data. By way of example, a method of determining a most likely sequence for a given data set comprises a computer system associated...
8897449 Quantum computing on encrypted data  
Quantum computing methods and systems are described. A computing device receives an encrypted state from another device. The encrypted state is stored on a quantum register, and a sequence of...
8898452 Protocol translation  
A system and method for securing data by receiving encrypted data at a security appliance transmitted from a client, wherein at least a portion of the encrypted data is encrypted according to a...
8897442 Encryption device, decryption device, encryption method, decryption method, program, and recording medium  
In encryption, a random number r is generated to generate a ciphertext C2=M(+)R(r), function values HS(r, C2), a common key K, a ciphertext C(Ψ+1) of the random number r using the common key K,...
8891762 Method for privacy-preserving order selection of encrypted element  
A system and a method select an encrypted element in an encrypted vector according to an order of the encrypted element in the encrypted vector. The selecting is performed in a privacy-preserving...
8892901 Method and apparatus for encrypting user data  
A mobile terminal is capable of performing message encryption. The mobile terminal includes a display unit that can display contents of a message and an input unit that can receive a selection...