Matches 1 - 50 out of 51 1 2 >


Match Document Document Title
US20140270171 METHOD AND APPARATUS FOR SECURE DISTRIBUTION OF DIGITAL CONTENT  
A method and apparatus for secure distribution of digital content is provided. In accordance with at least one embodiment, an intermediate device maintains an authorized content sink list which it...
US20140207709 PREDICTIVE INFORMATION TRANSMISSION  
Embodiments of a system and methods for predictive transmission of information are generally described herein. In some embodiments, a system includes a ground moving target indicator (GMTI)...
US20090110196 Key management system and method for wireless networks  
A key management method for wireless networks is disclosed. Before a mobile station residing in a first ASN switches to a neighboring second ASN, an authentication process between the mobile...
US20080192932 Method of Securely Reading Data From a Transponder  
The invention discloses a method of reading data (dat) from a first transponder (TAG1) into a transceiver (REA). Said (dat) are only transmitted from the first transponder (TAG1) to the...
US20060093144 Communications method for at least two system components of a motor vehicle  
In a communications system for at least two system components over a network connection, e.g., a CAN bus system of a motor vehicle, system components have ready in each case a prespecified, fixed...
US20080192931 Method For Allocating Authorization Key Identifier For Wireless Portable Internet System  
The present invention relates to a method for allocating an authorization key identifier in a wireless portable Internet system. In a privacy key management version 2 (PKMv2) of the wireless...
US20080226071 METHOD FOR ESTABLISHING SECURE ASSOCIATIONS WITHIN A COMMUNICATION NETWORK  
A method for security authentication within a wireless network is disclosed. A method within an adhoc mesh network for two devices to quickly determine roles (i.e. which is the authenticator and...
US20080137859 PUBLIC KEY PASSING  
An improved approach to public key passing is provided to inhibit man-in-the-middle (MITM) attacks during an exchange of public keys over one or more public networks. In one embodiment, a method...
US20080159535 Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame  
A method of protecting a broadcast frame, the method comprising broadcasting a beacon and a maintenance beacon frame (MBF) from an access point (AP) to a plurality of terminals during a...
US20070291944 METHODS AND SYSTEMS FOR BLACKOUT PROVISIONING IN A DISTRIBUTION NETWORK  
Methods and systems for blackout provisioning in a communication network. In an aspect, a method is provided for blackout provisioning in a distribution network. The method includes determining...
US20080280626 Method for Providing Location-Based Service Using Location Token  
Provided is a method for providing a location-based service using a location token. The method includes the steps of: a) receiving an encrypted token message including constraints for location...
US20120237028 MISSION PLANNING INTERFACE FOR ACCESSING VEHICLE RESOURCES  
In an aspect, the invention features a method for mission planning The method includes displaying a graphical representation of a geographical area and displaying a graphical representation of one...
US20080310626 ENCRYPTED COMMUNICATION SYSTEM, ENCRYPTED COMMUNICATION METHOD, ENCRYPTING DEVICE, AND DECRYPTING DEVICE  
To allow viewers to view a plain document depending on levels of the authorized powers of the viewers without inserting identifiers into the plain document. An encrypting device includes devices...
US20080159536 Automatic Wireless Network Password Update  
An approach is provided that allows an administrator to set a new password at a wireless access point, such as a traditional WAP or a wireless router. The wireless access point creates a message...
US20130315392 METHOD FOR DISPLAYING READABLE CONTENTS ON A MOBILE READING DEVICE IN A LOCATION-RESTRICTED MANNER  
The invention relates to a system and method, by means of which the availability of readable contents (books, magazines, documents) can be linked according to location. The invention further...
US20060171538 Information technology (IT) equipment positioning system  
An information technology (IT) equipment positioning system comprises a plurality of wireless transponders distributed in multiple locations in the data center and a controller. The controller is...
US20070116288 System for managing keys and/or rights objects  
One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an...
US20120328101 METHOD AND SYSTEM OF LOCATION-AWARE CERTIFICATE BASED AUTHENTICATION  
In one aspect, a method of mutual certificate authentication between a first device and a second device based on location is described. This embodiment of a method comprises receiving a request...
US20090086971 SELECTIVE SECURITY TERMINATION IN NEXT GENERATION MOBILE NETWORKS  
Systems and/or methods of selectively terminating security in mobile networks are presented. User equipment (UE) can specify cipher termination location capabilities for encrypting/decrypting data...
US20080298589 ESTABLISHING A UNIQUE END-TO-END MANAGEMENT KEY  
Systems and methods for communicating and authenticating end-to-end management keys to stations to facilitate communications between stations in the network. A nonce based upon a pseudo-random...
US20090323953 SYSTEM AND METHOD OF DECOUPLING AND EXPOSING COMPUTING DEVICE ORIGINATED LOCATION INFORMATION  
A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset...
US20080226070 COORDINATE-BASED ENCRYPTION SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT  
An encryption system, method, and computer program product are provided. After the receipt of encrypted content, a plurality of coordinates associated with a location of a device are identified....
US20120314861 SYSTEM AND METHOD OF DECOUPLING AND EXPOSING COMPUTING DEVICE ORIGINATED LOCATION INFORMATION  
A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset...
US20090161868 METHOD AND SYSTEM FOR SECURELY COMMUNICATING BETWEEN A USER NETWORK DEVICE, A PRIMARY SERVICE PROVIDER AND A PARTNER SERVICE PROVIDER  
A system and method is set forth for communicating between a user network device, a partner service provider, a primary service provider and a user network device. The user network device...
US20090103730 APPARATUS AND METHOD FOR USING A DEVICE CONFORMING TO A PAYMENT STANDARD FOR ACCESS CONTROL AND/OR SECURE DATA STORAGE  
Secure establishment of a key associated with a first facility identifier is facilitated. The key is shared between a device and an operator of a first facility, via a public key management...
US20070200756 Position Guarantee Server, Position Guarantee System, And Position Guarantee Method  
To obtain highly reliable position guarantee that makes it difficult for data to be tampered with and allows a prompt response. A position guarantee server includes: a communication section that...
US20090161867 METHOD AND SYSTEM FOR AUTHENTICATING A USER RECEIVING DEVICE INTO A PRIMARY SERVICE PROVIDER SYSTEM TO COMMUNICATE WITH A PARTNER SERVICE PROVIDER  
A method and system for authenticating a user receiving device to communicate with a partner service device includes a primary service provider. A user receiving device generates a request for a...
US20080080712 System and methods for secure communication using an enhanced GPS receiver  
An enhanced GPS receiver is provided for secure location information communication. The GPS receiver includes a GPS signal receiving unit, a GPS signal processing unit, and en encryption module....
US20060104447 Discrete logarithm-based cryptography using the Shafarevich-Tate group  
Systems and methods for discrete logarithm-based cryptography using the Shafarevich-Tate group are described. In one aspect, a Shafarevich-Tate group is generated from an abelian variety. Data is...
US20080107266 CRYPTOLOGY CALCULATION FOR LAST USED AUTHENTICATION DEVICE  
A passive start and entry system includes a controller that determines the desired encryption for a last authenticated identification device during the period in which responses are received from...
US20090097651 IMPARTING CRYPTOGRAPHIC INFORMATION IN NETWORK COMMUNICATIONS  
This specification describes technologies relating to imparting cryptographic information in network communications. In general, aspects of the subject matter described in this specification can...
US20080181403 AUTHENTICATING SYSTEM, AUTHENTICATING METHOD, AND AUTHENTICATING PROGRAM  
The present invention is an authenticating system including: a client (hereinafter, referred to as C) including a creator for, by employing a first hash algorithm (hereinafter, referred to as 1A),...
US20080208925 Communication Method and System  
A communication method is disclosed as including the steps of (a) associating sensor with an object; (b) associating a mobile phone or personal digital assistant with a secure token capable of...
US20090316900 METHOD AND APPARATUS FOR USING NAVIGATION SIGNAL INFORMATION FOR GEOENCRYPTION TO ENHANCE SECURITY  
A data encryption and decryption system securely geoencrypts data using location-dependent navigation signals. To increase the entropy of the cryptographic key to guard against a brute-force...
US20080260152 Proofs of Vicinity Using Cpufs  
The present invention relates to a method and a device (104) for authenticating a plurality of physical tokens (101, 102, 103). A basic idea of the invention is to supply a sequence of...
US20080192933 Portable electronic entity and communication method  
The pocket portable electronic entity (400) includes: connection element (420) for removable connection to a host station (300),first members (460, 470, 471) for secure communication with a remote...
US20080298590 NETWORK ENCRYPTION KEY ROTATION  
Systems and methods for authenticating key rotation communications. Key rotation communications can include a key counter known to both a headend device and a station. Comparison between a local...
US20080165967 Method and Device For Migrating a Specifically Encrypted Access Object From a First Terminal Unit to a Second Terminal Unit  
The present invention provides a method, a migration server and a terminal device mor migrating specifically encrypted access objects (such as e.g. a license) between mobile terminals such as e.g....
US20090303030 Method and Device for Configuring Functional Capabilities in a Data Processing System  
Configuring functional capabilities in a data processing system comprising entitlement data in a non-volatile storage. The position of the data processing system is determined. Based on said...
US20090097642 Secure Content Distribution with Distributed Hardware  
This document describes tools capable of securely distributing entertainment content among and using distributed hardware. These tools may do so robustly by rebinding entertainment content between...
US20100134280 TRACKING SYSTEM WITH REDUNDANT SECURITY AND RETRANSMISSION FEATURES  
The invention relates to a tracking system with redundant security and retransmission features. The invention comprises one or more positioning devices (2), one or more localisers (1), one or more...
US20070076877 Shared key encryption using long keypads  
Methods of securely communicating a message from a first terminal to a second terminal include generating a keypad including a random sequence of bits having a length L, encrypting the message at...
US20070201699 BROADCAST RECEIVER AND BROADCAST RECEIVING METHOD  
When a broadcasting station transmits an application including an authentication key enabling use of a program recommendation engine or the like together with a program, a broadcast receiver...
US20090185682 SYSTEMS AND METHODS FOR IMPROVING HIGH- BANDWIDTH DIGITAL CONTENT PROTECTION (HDCP) AUTHENTICATION WITH DIGITAL VIDEO INTERFACE (DVI) OR HIGH-DEFINITION MULTIMEDIA INTERFACE (HDMI) RECEIVER DEVICES  
Systems and methods for improving HDCP (High-Bandwidth Digital Content Protection) authentication with DVI or HDMI receiver devices are provided. An HDCP transmitting apparatus according to the...
US20080253569 System and method for performing authentication in a wireless mobile communication system  
A system and method for authentication in a wireless mobile communication system are provided, in which a mobile station calculates a CMAC value having a first number of bits, transmits to a base...
US20080205647 Information Subscribing System for Portable Terminal Device Having Autonomous Network Access  
An information subscribing system for portable terminal device 20 having autonomous network access, wherein the portable terminal device 20 communicates to the transmission authentication control...
US20100153011 METHOD AND APPARATUS FOR EVIDENCING A TRANSACTION USING LOCATION INFORMATION  
An apparatus for evidencing an occurrence of a transaction is provided that includes a tamper indicating housing, a processing unit provided within the tamper indicating housing, and a...
US20160359623 VERIFICATION SYSTEM AND METHOD  
A method is provided for a verifying system to verify a location of a target apparatus. The method comprises transmitting a plurality of signals from two or more of a plurality of communication...
US20160021074 SYSTEM AND METHOD OF DECOUPLING AND EXPOSING COMPUTING DEVICE ORIGINATED LOCATION INFORMATION  
A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset...
US20150071440 SYSTEMS AND METHODS FOR PROVIDING CONDITIONAL ACCESS TO TRANSMITTED INFORMATION  
This disclosure relates to systems, methods, computer program products, and means that control access to position information at a receiver, or at another device external to the receiver, based on...

Matches 1 - 50 out of 51 1 2 >