Matches 1 - 50 out of 327 1 2 3 4 5 6 7 >

AcclaimIP-ad

Match Document Document Title
9037875 Key generation techniques  
In one or more embodiments, an integrated circuit includes a programmable memory, a key generation module and a module. The programmable memory is to maintain a first key portion. The key...
9032208 Communication terminal, communication system, communication method and communication program  
A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not...
9015487 Apparatus and method for virtual pairing using an existing wireless connection key  
Disclosed is a method for virtual pairing of a first peer device with a second peer device. In the method, a nonce is generated at the first peer device for use in virtually pairing the first and...
9015826 Mobile platform security apparatus and method  
A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third...
9008311 Method for encryption and decryption of messages  
A communication system that includes a sender computer and plurality of designated receiver computers coupled to the sender through a communication link. Each one of the receiver computers is...
8995653 Generating a secret key from an asymmetric private key  
Embodiments of the present invention address deficiencies of the art in respect to symmetric key generation and provide a method, system and computer program product for symmetric key generation...
8995660 Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium  
A cryptographic communication technology that is based on functional encryption and that can operate flexibly is provided. A conversion rule information pair is determined in advance, which has...
8989374 Cryptographic device for secure authentication  
According to one embodiment, a memory being used to store a host identification key, a host constant (HC), and a first key, the first key being generated based on the host constant (HC); a first...
8983068 Masked nonlinear feedback shift register  
An NLFSR of length k, configured to output a sequence of masked values x′i=xi+mi according to a masked recurrence x′n+k=f(x′n, . . . , x′n+k−1), the NLFSR including a nonlinear feedback function...
8964982 Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium  
A cryptographic communication technology that is based on predicate encryption and that can operate flexibly is provided. A conversion rule information pair is determined in advance, which has...
8958555 Fast computation of a single coefficient in an inverse polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
8954745 Method and apparatus for generating one-time passwords  
A method and apparatus are provided to allow a user of a communications device to utilize one-time password generators for two-way authentication of users and servers, i.e., proving to users that...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8935762 Authentication system and method  
An authentication server and user device are provided. The authentication server includes: a memory for storing a user identification code associated with a user; a function generator for...
8929554 Secure multi-party communication with quantum key distribution managed by trusted authority  
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution (“QKD”) are described herein. In example implementations, a trusted authority...
8898463 Device  
According to one embodiment, a device includes a cell array including an ordinary area, a hidden area, and an identification information record area in which identification information which...
8886935 Key management device, system and method having a rekey mechanism  
According to some embodiments, a key management apparatus for deploying in a smart grid system adapted to receive metering data from smart meters connected to at least one relay via a network,...
8861722 Generating a session key for authentication and secure data transfer  
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner, from secret information which may be...
8861721 System and method for securing scalar multiplication against simple power attacks  
The system and method for securing scalar multiplication against simple power attacks (SPAs) delays required point additions in elliptic curve cryptosystem scalar multiplication. A buffer is used...
8862867 Method and system for protecting security of the third layer mobility user plane data in NGN  
The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing authentication by a terminal with an...
8842826 Information-theoretically secure secrecy generation  
A method and apparatus are provided for performing information-theoretically secure cryptography using joint randomness not shared by others. Two valid communicating entities independently...
8811615 Index-based coding with a pseudo-random source  
Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of...
8804952 System and method for securing scalar multiplication against differential power attacks  
The system and method for securing scalar multiplication against differential power attacks (DPAs) delays required point additions in elliptic curve cryptosystem scalar multiplication. A buffer is...
8804963 Computer readable medium storing key generating program, computer readable medium storing key recording program, key generating device, PKI card, key recording system, key generating method and key recording method  
A computer readable medium stores a program causing a computer to execute a key generating processing. The computer generates a signatory private key which is used in an electronic signature, a...
8788810 Temporary registration of devices  
In a method of temporarily registering a second device with a first device, in which the first device includes a temporary registration mode, the temporary registration mode in the first device is...
8787564 Assessing cryptographic entropy  
Systems, methods, software, and combinations thereof for evaluating entropy in a cryptography system are described. In some aspects, sample values are produced by an entropy source system. A...
8738924 Electronic system and digital right management methods thereof  
An electronic system is provided, in which a smart chip, a smart chip controller, a processor, a system memory, and an access management module is provided. The smart chip controller communicates...
8724803 Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system  
A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a...
8712057 Apparatus and method for an iterative cryptographic block  
A method and apparatus for an iterative cryptographic block under the control of a CPU and without a fixed number of stages. In one embodiment, a first cryptographic block descrambles received...
8712046 Cryptographic key split combiner  
A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key...
8705732 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Generating a session key for authentication and secure data transfer
 
A device for generating a session key which is known to a first communication partner and a second communication partner, for the first communication partner, from secret information which may be...
8700899 Forward-secure key unlocking for cryptographic devices  
A first cryptographic device is configured to determine at least a key for a current epoch and a key for a subsequent epoch, and to transmit the keys for the current and subsequent epochs over a...
8699706 Method for generating rights object and device to perform the method, method for transmitting rights object and device to perform the method, and method for receiving rights object and device to perform the method  
A method for transmitting a Rights Object (RO) includes generating a password key by encrypting a password, generating the RO using the password key, and transmitting the RO from a first device to...
8694786 Virtual machine images encryption using trusted computing group sealing  
A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on...
8693682 Data encryption  
A system for encryption, and subsequent decryption, of encoded data allows for transcoding of the encrypted data. The data is encoded in such a way that different packets have different importance...
8660268 Keyed pseudo-random number generator  
A method and apparatus for client authentication using a pseudo-random number generation system. The pseudo-random number generation utilizes a secret key as well as state information as input...
8654972 Keystream encryption device, method, and program  
A stream encryption device generates a first pseudo random number sequence from key information, generates a second pseudo random number sequence according to clock control performed according to...
8649519 Method and apparatus for secure distribution of digital content  
A method and apparatus for secure distribution of digital content is provided. In accordance with at least one embodiment, an intermediate device maintains an authorized content sink list which it...
8630416 Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications  
Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key...
8606039 Information processing apparatus, control method for the same, and computer program  
An information processing apparatus comprises: a division unit dividing input data; a processing unit performing predetermined processing for the divided data; a generation unit generating...
8595501 Network helper for authentication between a token and verifiers  
A network helper is provided that assists verifiers in executing a puzzle-based protocol for authentication of a token. A token stores a secret key and one or more puzzle-generating algorithms....
8577032 Common key block encryption device, common key block encryption method, and program  
A common key block encryption device includes a first hash unit applying locked key permutation to a variable-length s-bit plaintext, and outputting a fixed-length n-bit first block and a second...
8572379 Private access to hash tables  
A server and a client mutually exclusively execute server-side and client-side commutative cryptographic processes and server-side and client-side commutative permutation processes. The server has...
8565427 Enforcing software independent content protection in an electronic device  
A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and processing circuitry coupled to the...
8559480 Apparatus and method for generating scrambling codes in a radio communication system  
An apparatus and method for generating a scrambling code in a radio communication system is disclosed. In particular, an apparatus and method for generating a scrambling code using a Gold-like...
8553880 Pseudorandom number generating system, encryption system, and decryption system  
The pseudorandom number generating system repeatedly performs simple transformation of a non-secure pseudorandom number sequence that may be generated quickly, and thus may quickly generate a...
8548171 Pair-wise keying for tunneled virtual private networks  
In an embodiment, a method for generating and distributing keys retains the scalability of a group VPN, but also provides true pair-wise keying such that an attacker who compromises one of the...
8543837 Method of randomly and dynamically checking configuration integrity of a gaming system  
In a gaming environment, a method of periodically downloading dynamically generated executable modules at random intervals that perform system configuration integrity checks in a secure and...
8533489 Searchable symmetric encryption with dynamic updating  
A Searchable Symmetric Encryption (SSE) mechanism is described which allows efficient dynamic updating of encrypted index information. The encrypted index information includes pointer information...
8532289 Fast computation of a single coefficient in an inverse polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
Matches 1 - 50 out of 327 1 2 3 4 5 6 7 >