Match Document Document Title
9042545 Apparatus and method for converting random binary sequence into random integer  
An apparatus and method for converting a random binary sequence into a random integer is provided. The present invention converts a random binary sequence into a random integer, and determines...
9032208 Communication terminal, communication system, communication method and communication program  
A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not...
9031234 Encryption device and decryption device  
According to one embodiment, an encryption device includes a storage unit, an input unit, first to fourth partial encryption units, a generation unit, and an output unit. The first partial...
9008303 Method and apparatus for generating forward secure pseudorandom numbers  
Methods and apparatus are provided for generation of forward secure pseudorandom numbers. A forward secure pseudorandom number is generated by obtaining a first state si corresponding to a current...
9002004 Appending pseudo-random sub-LSB values to prevent intensity banding  
Embodiments of the present invention provide a test and measurement instrument that displays acquired data on a logarithmic scale without intensity banding. The test and measurement instrument...
8990570 Secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer  
Methods and apparatus are provided for secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer. An information-theoretic version of a...
8989373 Method for connecting an external apparatus and multimedia replaying apparatus using the same  
A method for connecting an external apparatus and a multimedia replaying apparatus using the same. The method includes determining whether a command for displaying menus is input while multimedia...
8983069 System and method for counter mode encrypted communication with reduced bandwidth  
In a counter mode encryption scheme, a sending device sends a first message including first cipher text and a first counter used to generate the first cipher text to a receiving device for...
8983068 Masked nonlinear feedback shift register  
An NLFSR of length k, configured to output a sequence of masked values x′i=xi+mi according to a masked recurrence x′n+k=f(x′n, . . . , x′n+k−1), the NLFSR including a nonlinear feedback function...
8971530 Cryptographic key generation using a stored input value and a stored count value  
Embodiments of an invention for cryptographic key generation using a stored input value and a stored count value have been described. In one embodiment, a processor includes non-volatile storage...
8964976 Secure storage and retrieval of confidential information  
A secure information storage management system may securely manage the storage of confidential information. A randomizer module may randomly generate a schema that specifies a random number of...
8958555 Fast computation of a single coefficient in an inverse polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
8958562 Format-preserving cryptographic systems  
Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating...
8958556 Method of secure cryptographic calculation, in particular, against attacks of the DFA and unidirectional type, and corresponding component  
A method of secure cryptographic calculation includes formulating a first list of first random quantities, formulating a first non-linear substitution operator masked with at least part of the...
8954745 Method and apparatus for generating one-time passwords  
A method and apparatus are provided to allow a user of a communications device to utilize one-time password generators for two-way authentication of users and servers, i.e., proving to users that...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8941405 FET pair based physically unclonable function (PUF) circuit with a constant common mode voltage  
A FET pair based physically unclonable function (PUF) circuit with a constant common mode voltage and methods of use are disclosed. The circuit includes a first n-type field effect transistor...
8943332 Audit-log integrity using redactable signatures  
A method of establishing the integrity of an audit record set is described. The method comprises receiving a set of audit records and generating a first set of random values wherein each audit...
8943567 Authentication of personal data over telecommunications system  
An additional service that authenticates personal information of a second person by using the mobile identification service in response to a first person requesting authentication is provided. As...
8930712 Metric obfuscation system  
A system for metric obfuscation may include one or more processors and memory. The one or more processors may receive a dataset comprising a plurality of metrics that relate to user demographic...
8907794 Cryptographic lock, method of operation thereof and secure container employing the same  
Various cryptographic locks for securing assets, secure containers and methods of operating a cryptographic lock. One embodiment of a cryptographic lock includes: (1) a shape memory alloy (SMA)...
8903085 Adding randomness internally to a wireless mobile communication device  
An electronic device is provided with an integral transducer used to update a random data pool without connection to an external source of new random data. In one embodiment, there is provided a...
8886947 Optimized integrity verification procedures  
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by...
8885830 Method and apparatus for dynamically establishing and joining an encrypted collaborative communication session  
A system for establishing an encrypted multicast communication session over a communications network can include a client means (e.g., a radio, laptop, workstation, phone, PDA) and a server means....
8885820 Key expansion using seed values  
Systems, methods, and other embodiments associated with reducing storage space used for cryptographic keys in a memory are described. According to one embodiment, an apparatus includes a...
8886960 Microprocessor that facilitates task switching between encrypted and unencrypted programs  
A microprocessor includes an architected register having a bit. The microprocessor sets the bit. The microprocessor also includes a fetch unit that fetches encrypted instructions from an...
8886940 Hash function using a card shuffling process  
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure. The process is based on the type of...
8880902 Microprocessor that securely decrypts and executes encrypted instructions  
A microprocessor is provided with a method for decrypting encrypted instruction data into plain text instruction data and securely executing the same. The microprocessor includes a master key...
8873750 Instruction for performing a pseudorandom number generate operation  
A machine instruction is provided that includes an opcode field to provide an opcode, the opcode to identify a perform pseudorandom number operation, and a register field to be used to identify a...
8874934 Nonvolatile memory device and operating method  
Disclosed is an operating method of a non-volatile memory device which comprises randomizing data to store the randomized data; erasing the randomized data; and outputting erase data according to...
8868911 Method for key generation, member authentication, and communication security in dynamic group  
The present invention provides a method for keys generation, member authentication and communication security in a dynamic group, which comprises steps: assigning each member an identification...
8861722 Generating a session key for authentication and secure data transfer  
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner, from secret information which may be...
8861721 System and method for securing scalar multiplication against simple power attacks  
The system and method for securing scalar multiplication against simple power attacks (SPAs) delays required point additions in elliptic curve cryptosystem scalar multiplication. A buffer is used...
8861727 Storage of sensitive data in a dispersed storage network  
A method begins by a processing module applying a share encoding function on data to produce a plurality of encoded shares and generating a corresponding plurality of random numbers for the...
8861719 Method of generating a random permutation, random permutation generating device, and encryption/decryption device having the same  
Generating a random permutation by arranging a sequence N numbers in a matrix, performing random arrangement operations on the rows of the matrix to generate an intermediary matrix, performing...
8862867 Method and system for protecting security of the third layer mobility user plane data in NGN  
The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing authentication by a terminal with an...
8855304 System and method for generating session keys  
The present disclosure describes systems and methods of generating a cryptographic session key based on a known master key shared between a sender communicator and a receiver communicator in a...
8850229 Apparatus for generating a decryption key for use to decrypt a block of encrypted instruction data being fetched from an instruction cache in a microprocessor  
An apparatus for generating a decryption key for use to decrypt a block of encrypted instruction data being fetched from an instruction cache in a microprocessor at a fetch address includes a...
8850203 Secure key management in multimedia communication system  
Principles of the invention provide one or more secure key management protocols for use in communication environments such as a media plane of a multimedia communication system. For example, a...
8850608 Embedded ring oscillator network for integrated circuit security and threat detection  
Aspects of the disclosure relate to combining on-chip structure with external current measurements for threat detection in an integrated circuit. This method considers Trojans' impact on...
8842826 Information-theoretically secure secrecy generation  
A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently...
8842839 Device with multiple one-time pads and method of managing such a device  
A device is arranged to carry out security-related tasks using one-time pad data. The device has a memory for holding multiple one-time pads, each pad having a different security rating and being...
8837719 Cryptographic methods and devices for pseudo-random generation, encrypting data, and cryptographically hashing a message  
The invention relates to the general field of digital security and more particularly cryptography. In particular it proposes a device and a method of encrypting a sequence of data. The invention...
8837720 Cryptographically secure pseudorandom number generator  
A hardware- and software-efficient class of cryptanalytically-safe pseudorandom number generators is disclosed. Embodiments of the class can be implemented with only a modest use of program space...
8831216 Pseudo-random number generation based on periodic sampling of one or more linear feedback shift registers  
Disclosed are various embodiments for generating pseudo-random numbers. One such embodiment is an apparatus comprising digital hardware configured to generate pseudo-random numbers. The apparatus...
8826042 Memory controller, memory control apparatus, memory device, memory information protection system, control method for memory control apparatus, and control method for memory device  
A technique allowing an improvement in the confidentiality of information stored in a memory device. A memory controller includes a key generation part that newly generates key information for use...
8825728 Entering confidential information on an untrusted machine  
Confidential information is provided to a proxy computer in communication between an unsecured computer and a computer having information desired by a user. The proxy computer receives the...
8817981 Generation of registration codes, keys and passcodes using non-determinism  
In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured...
8817975 Cryptographic processing apparatus and operation method  
According to one embodiment, a cryptographic processing apparatus is provided with first to fifth units. The first unit mask-converts input data from first temporary mask into first fixed mask (an...
8811615 Index-based coding with a pseudo-random source  
Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of...