Match Document Document Title
9037870 Method and system for providing a rotating key encrypted file system  
A file system data is divided into two or more data blocks. A unique encryption key is assigned to each data block with the encryption key assigned to each data block being distinct from other...
9031234 Encryption device and decryption device  
According to one embodiment, an encryption device includes a storage unit, an input unit, first to fourth partial encryption units, a generation unit, and an output unit. The first partial...
9025765 Data security  
A system 100 for increasing data security comprises predetermined system data 104 to be protected. A cryptographic unit 108 is used for cryptographic processing of respective blocks of the content...
9014370 High performance hardware-based execution unit for performing C2 block cipher encryption/decryption  
A system and method for encrypting and/or decrypting data with a Cryptomeria (C2) cipher may be provided that generates C2 round keys in parallel. Accordingly, data may be encrypted or decrypted...
9009496 Method and apparatus for implementing secure and selectively deniable file storage  
A method for writing data to a memory device comprising a first and a second memory device the first memory device comprises data blocks numbered with block numbers and the second memory device...
9002002 Method and apparatus of high speed encryption and decryption  
A hardware architecture for encryption and decryption device can improve the encryption and decryption data rate by using parallel processing, and pipeline operation, and save footprint by sharing...
9002000 Method for conversion of a first encryption into a second encryption  
A method for converting, by means of a conversion entity, a first digit into a second digit, the first cipher corresponding to the result of a symmetric probabilistic encryption of an plain...
8984268 Encrypted record transmission  
The invention provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one variation, the invention retains...
8983063 Method and system for high throughput blockwise independent encryption/decryption  
An encryption technique is disclosed for encrypting a plurality of data blocks of a data segment where the encryption selectively switches between a blockwise independent randomized (BIR)...
8983061 Method and apparatus for cryptographically processing data  
A method and apparatus cryptographically process data including a plurality of data segments. The cryptographic process includes (a) receiving a plurality of data segments, (b) selecting, for each...
8983069 System and method for counter mode encrypted communication with reduced bandwidth  
In a counter mode encryption scheme, a sending device sends a first message including first cipher text and a first counter used to generate the first cipher text to a receiving device for...
8977865 Data encryption conversion for independent agents  
The re-encryption of data can be performed with independent cryptographic agents that can automatically encrypt and decrypt data in accordance with cryptographic regions, such that data within a...
8973152 Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using the same  
A vehicle black box technique guarantees the integrity of vehicle data stored in a black box in real time by forming input data streams as block data and performing a signature using a signing key...
8964972 Apparatus, method, and system for digital content and access protection  
There is described a method for providing an audio signal to a user-end, comprising: modifying an amplitude of at least some bits of the audio signal using at least one user-specific series of...
8953788 Encrypting a data transmission using multiple channels  
A method, system, and media are provided for securely communicating data. One embodiment of the method includes encrypting a data stream by way of a first algorithm; creating at least two subsets...
8953646 Method and apparatus of multiplexing media streams  
An apparatus and method for generating a multiplex of media streams, the method includes the steps of: (i) receiving a set of media streams that comprises first type media stream components and...
8954756 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8949600 Composed message authentication code  
Prior to transmission, a message is divided into multiple transmission units. A sub-message authentication code is obtained for each of the transmission units. A composed message authentication...
8942371 Method and system for a symmetric block cipher using a plurality of symmetric algorithms  
A method and system for hybrid encryption wherein all of the round function variables including the encryption algorithm change for each round. This permits the generation of block sizes and key...
8938619 System and method for decrypting content samples including distinct encryption chains  
Embodiments may be configured to receive a protected version of content that includes multiple encrypted content samples. In various embodiments, each encrypted content sample includes multiple...
8938625 Systems and methods for securing cryptographic data using timestamps  
Systems and methods for authenticating playback devices using timestamp validation in accordance with embodiments of the invention are disclosed. One embodiment includes securely storing at least...
8929549 Method and device for setting up wireless network connection  
The present invention provides a method and device for setting up a wireless network connection. The second device sets up a connection with the wireless network according to the network...
8918650 Secure data processing for unaligned data  
A method for data cryptography includes accepting input data, which contains a section that is to undergo a cryptographic operation and starts at an offset with respect to a beginning of the input...
8908859 Cryptographic apparatus and memory system  
According to one embodiment, a cryptographic apparatus includes: cryptographic cores (“cores”), an assigning unit, a concatenating unit, and an output controlling unit. If a CTS flag thereof is...
8903087 Method and device for distributing secure digital audiovisual contents by interoperable solutions  
A method for distributing a nominal audiovisual stream to a recipient device including modifying, in the nominal audiovisual stream, at least one nominal coefficient among the nominal coefficients...
8892883 Render service for remote access to applications  
The present disclosure relates to providing remote access to applications with an increased level of security. A server for providing access to applications is provided, as well as a method...
8886947 Optimized integrity verification procedures  
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by...
8886940 Hash function using a card shuffling process  
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure. The process is based on the type of...
8885823 Method and apparatus for delivering encrypted on-demand content without use of an application defined protocol  
A method for delivering encrypted content to a subscriber terminal on-demand through a communication network is provided. The method begins when SRM receives a request for content from the...
8879727 Method and apparatus for hardware-accelerated encryption/decryption  
An integrated circuit for data encryption/decryption and secure key management is disclosed. The integrated circuit may be used in conjunction with other integrated circuits, processors, and...
8856504 Secure virtual machine bootstrap in untrusted cloud infrastructures  
Techniques are described for securely booting and executing a virtual machine (VM) image in an untrusted cloud infrastructure. A multi-core processor may be configured with additional hardware...
8856883 System and method for protecting MAC control messages  
A system to protect MAC control messages is presented. In one embodiment, the system comprises a processor, a memory coupled to the processor, and a communication device coupled to the processor...
8848903 Device for evaluating side-channel attack resistance, method for evaluating side-channel attack resistance, and program for evaluating side-channel attack  
A side channel attack resistance evaluation apparatus includes: a measurement section that measures side channel information leaking from an encryption device to be evaluated; a noise removal...
8842825 Data encoding apparatus, data encoding method, data encoding program, and recording medium  
A disclosed data encoding apparatus includes: an arbitrary number of storage units; a data transfer control unit dividing input data into data blocks in accordance with the arbitrary number of...
8837719 Cryptographic methods and devices for pseudo-random generation, encrypting data, and cryptographically hashing a message  
The invention relates to the general field of digital security and more particularly cryptography. In particular it proposes a device and a method of encrypting a sequence of data. The invention...
8837598 System and method for securely transmitting video over a network  
A method comprises receiving a bit stream associated with at least one video image, wherein the bit stream comprises at least one macroblock header and a plurality of macroblocks. The method...
8832466 Methods for augmentation and interpretation of data objects  
Efficient methods for implementing security and manageability for stored data objects involve logical object reorganization, computation and injection of metadata, and specialized data access...
8824672 Reconfigurable block encryption logic  
Methods and systems for cryptography use a reconfigurable platform to perform cryptographic functions. Where a reconfigurable platform is use the configuration may be used as a key or secret. The...
8804953 Extensive ciphertext feedback  
Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of...
8798270 Communication system and communication method  
To improve a communication system including two communication apparatuses in order to reduce a possibility of having communication thereof decrypted by a third party. The communication system...
8798263 Method and system for encryption with bidirectional difference propagation  
An encryption method is disclosed, including two passes over a sequence of N input digital data X1, . . . XN blocks where the first pass executes iterative linear algebraic operations from the...
8793510 Systems and methods for transformation of logical data objects for storage  
Systems and methods for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8782436 Method and system for transformation of logical data objects for storage  
A method and system for encrypting a plaintext logical data object for storage in a storage device operable with at least one storage protocol, creating, reading, writing, optimization and...
8781123 Method for processing location information relating to a terminal connected to a packet network via a cellular network  
A method (400) for processing location information relating to a certain mobile station in a cellular network is presented. The method involves a first network element, which is connected to the...
8781122 Elementary bitstream cryptographic material transport systems and methods  
Systems and methods for providing multimedia content from one process or component to another process or component over an unsecured connection are provided. One embodiment includes obtaining the...
8767959 Block encryption  
Methods and systems for encrypting and decrypting data are described. In one embodiment, a computing system determines a first initialization vector (IV) from another IV and a sequence number of a...
8767956 Cryptographic processing apparatus, cryptographic processing method, and computer program therefor  
A processing unit transforms first input information into first nonlinear transformed information that is transformed into first linear transformed information, and transforms second input...
8755518 System and method for dynamically allocating stream identifiers in a multi-encryption transport system  
The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a secondary overlay stream depending upon the identifiers in a primary...
8750498 Method and apparatus for encoding data in accordance with the advanced encryption standard (AES)  
A cryptographic device includes a first state module, a key addition module, a byte substitution module, and a column mixing module. The first state module stores a first data block. The key...
8744074 Method and device for countering fault attacks  
The public exponent e of an RSA key is embedded in a RSA key object that lacks this exponent. During exponentiation, the public exponent e may be extracted and used to verify that the result of...