Match Document Document Title
9043599 Method and server for providing a mobility key  
A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to...
9043604 Method and apparatus for key provisioning of hardware devices  
Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is...
9037861 Enhancing data security using re-encryption  
A data source may be configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage. A data warehouse server may...
9038192 Cryptanalysis method and system  
A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further...
9032473 Migration of credentials and/or domains between trusted hardware subscription modules  
Systems, methods, and instrumentalities are disclosed that allow a user to initiate migration of a credential from one domain to another domain. A request to initiate a migration of credentials...
9032208 Communication terminal, communication system, communication method and communication program  
A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not...
9032209 Optical network terminal management control interface-based passive optical network security enhancement  
A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical...
9032534 Setting in wireless communication device for encrypted communication  
A system administrator of a wireless LAN 100 manipulates a personal computer PC1 to change a WEP key. The personal computer PC1 authenticates a memory card MC as genuine under management of the...
9031235 Method and apparatus for use in a downloadable conditional access system  
In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor....
9027136 Automatic generation of attribute values for rules of a web application layer attack detector  
According to one embodiment, a web application layer attack detector (AD) is coupled between an HTTP client and a web application server. Responsive to receipt of a set of packets from the HTTP...
9027086 Securing organizational computing assets over a network using virtual domains  
A method for connecting to a trust broker system is disclosed. The electronic device stores encrypted identifying information for a plurality of client systems authorized to interact with the...
9021576 Apparatus and method for sharing of an encryption key in an ad-hoc network  
It is so arranged that an encryption key can be shared with a communication apparatus that participates in a network anew, even in an ad-hoc-mode type of environment. In order to achieve this, a...
9021248 Secure access of mobile devices using passwords  
Enhanced security measures are provided for accessing applications or data on a client device using an encryption scheme. The client device receives authorization to access the applications or...
9021566 Apparatus and method to securely connect to and manage X11 applications on a remote system through an HTTP client  
A web server authenticates a user with a web client using a database user table and provides a list of new applications, suspended application sessions, and running application sessions. In...
9015469 Supporting secure sessions in a cloud-based proxy service  
A proxy server in a cloud-based proxy service receives a secure session request from a client device for a secure session. The secure session request is received at the proxy server as a result of...
9013266 Authenticated radio frequency identification and key distribution system therefor  
An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such...
9015487 Apparatus and method for virtual pairing using an existing wireless connection key  
Disclosed is a method for virtual pairing of a first peer device with a second peer device. In the method, a nonce is generated at the first peer device for use in virtually pairing the first and...
9015478 System and method for preventing web crawler access  
Preventing web crawler access includes receiving a request for a webpage that includes web content that is to be protected from a web crawler, encrypting the web content to be protected to...
9014680 Apparatus, and an associated method, by which to activate a wireless device for a temporary period  
An apparatus, and an associated method, for providing secured effectuation of a communication service at a substitute mobile station. A user desiring temporarily to use a substitute mobile station...
9015806 Sending digital data visually using mobile display and camera sensor  
A system for establishing a connection between a first device and a wireless network includes a first control module, located on the first device, that receives encoded digital data. The encoded...
9015856 Mobile-device user authentication  
In one embodiment, receiving a notice from a first user associated with a first mobile device indicating that the first user wishes to share information of the first user with one or more second...
9015826 Mobile platform security apparatus and method  
A mobile platform security apparatus and method is provided. The apparatus may perform a security setting by generating a first authentication key, a second authentication key, and a third...
9008309 Circuit arrangement and a method for roaming between a visited network and a mobile station  
According to various aspects of this disclosure, a circuit arrangement is provided. The circuit arrangement may include: a memory configured to store a first encryption key for generating a first...
9009480 Techniques for handshake-free encrypted communication using public key bootstrapping  
Techniques for handshake-free encrypted communication using public key bootstrapping are described. An apparatus may comprise a key component, a message component, and a network component. The key...
9009479 Cryptographic techniques for a communications network  
Techniques are described for enabling authentication and/or key agreement between communications network stations and service networks. The techniques described include the negotiation and use of...
9009858 Systems and methods for providing and managing distributed enclaves  
A method for operating a distributed data management and control enclave comprises providing a policy that identifies a set of data to be managed and controlled. The policy further identifies...
9009481 System and method for protecting cryptographic assets from a white-box attack  
A digital signature generation (DSG) process which provides resistance against white box attackers is disclosed. This is done by applying specially selected data transformations to the inputs,...
9003492 Secure client authentication and service authorization in a shared communication network  
Functionality for secure client authentication and service authorization in a shared communication network are disclosed. A managing network device of a communication network causes a securely...
9003191 Token-based authentication using middle tier  
An intermediary system facilitates a connection request from a client to a server. The intermediary system may participate in either or both of a token creation phase and a server connection...
9003193 Electronic apparatus for delegation management and delegation management methods thereof  
A major management apparatus, an authorized management apparatus, an electronic apparatus for delegation management, and delegation management methods thereof are provided. The major management...
9003476 Communications security systems  
A method of establishing secure communications between a first computer, eg a client computer, and a second computer, eg a web server, whereby the client computer receives one or more security...
9001179 Transmission terminal, transmission method, and computer-readable recording medium storing transmission program  
A transmission terminal transmits video data and display data of a screen shared with another transmission terminal to the other transmission terminal via a predetermined relay apparatus. The...
9000883 Control apparatus and method utilizing identifying keys  
Method and apparatus for system control includes inputs for an input device which may take the form of switches or sensors. Input device states are related to identification keys. The...
9003147 Electronic device and save data recording method  
A virtual capacity acquisition unit acquires a size of virtual capacity of a save data area from an application. A storage capacity acquisition unit acquires a size of save data of the...
9003192 Protocol for protecting third party cryptographic keys  
A protocol is provided that permits a third-party key issuing entity to have its issued keys protected by an unrelated key protecting entity. In at least some embodiments, a trusted key protecting...
9003195 Password topology monitoring and enforcement  
The systems and methods described herein can be used for enhancing the security of computer passwords by electronically receiving a password, the password comprising a plurality of components,...
9002010 Secure communication of information over a wireless link  
Secure communication of information over a wireless link with apparatus including a blade management module and a plurality of blade servers, the blade servers connected for data communications...
8997241 Secure information handling system matrix bar code  
An information handling system analyzes secondary information captured with an image of a two-dimensional barcode to perform a function. For example, a mobile phone camera captures an image of a...
8996873 Secure session capability using public-key cryptography without access to the private key  
A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server. During the handshake...
8995664 Security in wireless communication system and device  
A method of implementing security in a wireless communication device (108) comprises receiving (300), at the device (108), a security mode command for activating a security mode in the device and...
8996860 Tolerance factor-based secret decay  
Session-specific information stored to a cookie or other secure token can be selected and/or caused to vary over time, such that older copies will become less useful over time. Such an approach...
8997197 Encryption-based data access management  
Encryption-based data access management may include a variety of processes. In one example, a device may transmit a user authentication request for decrypting encrypted data to a data storage...
8995666 Key scheduling device and key scheduling method  
According to one embodiment, in a key scheduling device, a non-linear transformation unit non-linearly transforms at least one of partial keys resulting from dividing an expanded key. A first...
8995661 Information provision system, provision information copying device, user terminal device and user management device  
A content encryption device generates encrypted content and an encrypted content copying device copies the encrypted content on an information storage medium. The storage medium is sold at a...
8997187 Delegating authorization to applications on a client device in a networked environment  
A computer-readable medium encoded with software for execution. When executed, the software may be operable to send to a remote server, from an agent application, a request for a first access...
8990570 Secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer  
Methods and apparatus are provided for secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer. An information-theoretic version of a...
8990571 Host device, semiconductor memory device, and authentication method  
According to one embodiment, encrypted secret identification information (E-SecretID) and the key management information (FKB) are read from a memory device. Encrypted management key (E-FKey) is...
8990894 Quality assured analytical testing system and method thereof  
A system and method for quality assured analytical testing is disclosed. A user is prompted by the system questions which relate to an analytical test to be conducted or an analytical instrument...
8989383 Data authentication using plural electronic keys  
A method for transmitting digital data to a recipient via a communications network includes providing digital data and digitally signing the digital data using N cryptographic keys. Each of the N...
8988713 Secure printing in a cloud-based print system  
The embodiments provide a printing system including an application manager, implemented at a cloud print server, configured to receive a print job including encrypted content to be printed by a...