Matches 1 - 50 out of 143 1 2 3 >

AcclaimIP-ad

Match Document Document Title
US20110026711 Asymmetric cryptography using shadow numbers  
A method and an apparatus for enciphering and deciphering content with symmetric and asymmetric cryptography with the use of the shadow numbering system where two or more shadow values are used...
US20120030475 MACHINE-MACHINE AUTHENTICATION METHOD AND HUMAN-MACHINE AUTHENTICATION METHOD FOR CLOUD COMPUTING  
A Machine-Machine Authentication method and a Human-Machine Authentication method for Cloud Computing. A Smart Card IC that includes a TPM/TCM/USB key function module and a storage memory, and a...
US20100115274 Conditional access system and method  
The present invention relates to methods of and systems for providing conditional access to electronic content. Electronic content is provided to a user along with authorization information. The...
US20120170743 METHODS FOR ESTABLISHING A SECURE POINT-TO-POINT CALL ON A TRUNKED NETWORK  
Methods for establishing secure point-to-point communications in a trunked radio system include receiving, at a trunking controller, a request from a source endpoint for a traffic channel for...
US20140037092 METHOD AND SYSTEM OF RECONSTRUCTING A SECRET CODE IN A VEHICLE FOR PERFORMING SECURE OPERATIONS  
A method is provided for constructing a secret code in a processing unit when in communication with a portable security unit. Mutual authentication messages are exchanged between a linked portable...
US20110066853 SYSTEM AND METHOD FOR SECURELY IDENTIFYING AND AUTHENTICATING DEVICES IN A SYMMETRIC ENCRYPTION SYSTEM  
The present invention describes a system and method for securely identifying and authenticating devices in a symmetric encryption system. An RFID tag can generate indicators using encryption state...
US20110258437 SECURE LOCAL UPDATE OF CONTENT MANAGEMENT SOFTWARE  
This document describes tools that enable a computing device to receive an update to content management software. The tools also enable the computing device to generate new public and private keys...
US20110176678 MASKING OPERATION METHOD AND DEVICE FOR SYMMETRIC KEY ENCRYPTED SYSTEM  
A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input;...
US20110142237 SYSTEMS AND METHODS FOR SECURE WATCHLISTING  
A watchlisting module is configured to securely and efficiently create, modify, manage, and store a watchlist. The watchlisting module is configured to generate a watchlist consisting of watchlist...
US20110228940 REMOTE REGISTRATION FOR ENTERPRISE APPLICATIONS  
A partner registration module can provide for an automatic registration of partners to a central server. An entire partner registration process can be automated from end to end, providing a...
US20090041244 Secure Access System and Method  
In one embodiment, a storage device is provided that includes: a storage medium; and a storage engine, the storage engine being configured to generate a secure session key and to receive encrypted...
US20100325438 System and Method for Binding a Smartcard and a Smartcard Reader  
Systems and methods for binding a smartcard and a smartcard reader are provided. A smartcard is provision to store a first set of credentials for use in traditional transactions such as at a brick...
US20150180653 Module for "Machine-to-Machine" Communications using Public Key Infrastructure  
Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. The module and server can utilize public key infrastructure (PKI) such as public...
US20050265550 Polynomial-based multi-user key generation and authentication method and system  
A method of generating a common secret between a first party and a second party, preferably devices (101-105) in a home network (100) that operate in accordance with a Digital Rights Management...
US20110069836 OFF-LINE CONTENT DELIVERY SYSTEM WITH LAYERED ENCRYPTION  
Systems and methods are described for over-encrypting symmetrically pre-encrypted content for off-line delivery to playback devices using portable media drives in accordance with embodiments of...
US20080294726 Private electronic information exchange  
Methods and apparatuses for private electronic information exchange are described herein. In one embodiment, when electronic information is received to be delivered to a recipient, the electronic...
US20110099591 SECURE WIRELESS PAIRING OF DIGITAL TV SHORT-RANGE TRANSMITTER AND RECEIVER  
Embodiments of wireless display of digital content include transmission using a television transmission standard, such as a set of standards defined by the Advanced Television Systems Committee...
US20140105395 LOCATION SERVICES FOR A WIRELESS DEVICE  
In an example embodiment, a wireless device is operable to advertise a policy on the inclusion of the wireless device in a radio frequency map. For example, the wireless device map transmit a...
US20120134497 LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES  
Techniques to load balance traffic in a communication network include a network switch or device having an interface to receive a data unit or packet. The network device includes a hash value...
US20130163758 Methods and Apparatus for Key Delivery in HTTP Live Streaming  
A key delivery mechanism that delivers keys to an OS platform (e.g., iOS platform) devices for decrypting encrypted HTTP live streaming data. An HTTPS URL for a stateless HTTPS service is included...
US20150172258 SYMMETRIC ENCRYPTION APPARATUS AND STORAGE MEDIUM, AND SYMMETRIC DECRYPTION APPARATUS AND STORAGE MEDIUM  
In a symmetric encryption apparatus according to an embodiment, a storage unit stores a symmetric key formed from a plurality of elements of a first polynomial ring. A plaintext acceptance unit...
US20070014407 Symmetric cryptography with user authentication  
A device uses a user authentication factor to generate a symmetric key for use in symmetric cryptography. The user authentication factor is encrypted and stored for authentication during decryption.
US20070253553 System, Method of Generation and Use of Bilaterally Generated Variable Instant Passwords.  
In Bilaterally Generated Variable Instant Password system, Variable character sets or Master Variable Character Set with Sub Variable Character Sets of any level containing Character Units are...
US20100023962 Method for Single Sign-On When Using a Set-Top Box  
When the set-top box (STB) has been switched on, registration and authentication with the provider (IDP) are carried out (1, 2, 3). Following successful authentication, a piece of authentication...
US20090106551 DYNAMIC DISTRIBUTED KEY SYSTEM AND METHOD FOR IDENTITY MANAGEMENT, AUTHENTICATION SERVERS, DATA SECURITY AND PREVENTING MAN-IN-THE-MIDDLE ATTACKS  
A distributed key encryption system and method is provided in which a key storage server provides a session key to the source and destination computers by encrypting the session key with unique...
US20050036620 Encryption of radio frequency identification tags  
A method for encrypting and decrypting user data stored on identification tags, such as RFID tags, of the type having a tag identification code unique to each tag. An encryption/decryption key...
US20080260153 Symmetric and asymmetric cryptography using shadow numbers  
A method and an apparatus for enciphering and deciphering content with symmetric and asymmetric cryptography with the use of the shadow numbering system where two or more shadow values are used...
US20110317837 TWO INDICES MOVING IN OPPOSITE DIRECTIONS FOR CRYPTOGRAPHIC BIDIRECTIONAL COMMUNICATIONS USING A SHARED MASTER KEY  
A master key may be used by each participant in a secure communication. Indeed, each participant may select and encryption key from a distinct end of the master key. To eliminate a necessity for...
US20110305337 SYSTEMS AND METHODS TO SECURE LAPTOPS OR PORTABLE COMPUTING DEVICES  
A security system includes an appliance to be secured, including a processor and a first wireless transceiver for accessing a data network with a first power requirement; and a second wireless...
US20120163598 SESSION SECURE WEB CONTENT DELIVERY  
Various embodiments herein include one or more of systems, methods, and software to provide session secure web content delivery. Some embodiments include initiating a session on a web server in...
US20100189261 METHOD AND SYSTEM FOR EXTENDING ADVANCED ENCRYPTION STANDARD (AES) OPERATIONS FOR ENHANCED SECURITY  
In a wireless communication system, a method and system for extending Advanced Encryption Standard (AES) operations for enhanced security are provided. In an AES encryption operation, an initial...
US20100161982 HOME NETWORK SYSTEM  
A home network system includes: a plurality of wireless devices cooperated with a home network, each device having a tag attached thereto to identify it; a tag reader for reading tag information...
US20110033050 TEIRED KEY COMMUNICATION SYSTEM AND METHOD IN SUPPORT OF CONTROLLED VENDOR MESSAGE PROCESSING  
A computer-implemented system processes secure electronic documents from one or more content providers in accordance with subscriber instructions has a processor and modules operative within the...
US20100122085 SYSTEM AND METHOD FOR PROVIDING VARIABLE SECURITY LEVEL IN A WIRELESS COMMUNICATION SYSTEM  
A system and method for providing variable security levels in a wireless communication network. The present invention optimizes the often conflicting demands of highly secure wireless...
US20120076302 Leakage-Resilient Garbled Circuit Generation Using Reduced Memory Hardware Token  
A garbled circuit is generated for a client in a leakage-resilient manner with a reduced memory requirement. The garbled circuit is used for secure function evaluation between the client and a...
US20090271621 SIMPLIFIED LOGIN FOR MOBILE DEVICES  
Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The...
US20090307488 HEALTH KEYSET MANAGEMENT  
Systems and methodologies that facilitate delegation of keyset management to a platform presenting a centralized health-related data repository are provided. Effectively, a central keyset manager...
US20140068261 Methods And Apparatus For Use In Sharing Credentials Amongst A Plurality Of Mobile Communication Devices  
Techniques for use in sharing a plurality of credential objects of a user account amongst a plurality of mobile devices operative in a wireless network are described. In one illustrative example,...
US20110317838 METHOD FOR SECURE COMMUNICATION IN A NETWORK, A COMMUNICATION DEVICE, A NETWORK AND A COMPUTER PROGRAM THEREFOR  
A method for securing communications between a first node (N1) and a second node (N2) in a network (1) further comprising a management device (2) provided with root keying materials, the method...
US20090016527 METHOD OF ESTABLISHING A SESSION KEY AND UNITS FOR IMPLEMENTING THE METHOD  
A method of establishing a session key Ks for a session between a unit for descrambling scrambled multimedia signals and a removable cryptographic unit, wherein: —one of the units sends (steps...
US20090285394 ENCRYPTION METHODS FOR SATELLITE RADIO BROADCASTING  
According to the invention, a subscriber to a first satellite radio service can be provided with an option to receive, over their current receiver unit, supplemental content, such as a particular...
US20090132811 ACCESS TO AUTHORIZED DOMAINS  
In a domain comprising a plurality of devices, the devices in the domain sharing a common domain key, a method of enabling a entity that is not a member of the domain to create an object that can...
US20090296924 KEY MANAGEMENT FOR COMMUNICATION NETWORKS  
One embodiment of the present invention relates to a method for key management in a communications network. In this method, a public key authentication scheme is carried out between a security...
US20080037785 Constrained Cryptographic Keys  
A constrained proxy key is used to secure communications between two devices via an intermediary device. A first proxy key is generated at a host device (key generator device) based on a shared...
US20060193470 Data storage device with data transformation capability  
In a preferred embodiment a method of operating an intelligent disk drive is described which includes compression and/or encryption capability at the file level. The intelligent disk drive...
US20070053516 Symmetric key encryption system with synchronously updating expanded key  
A method, apparatus, and system of encryption, including embedding reconfiguration information within a ciphertext block destined for a decryptor. The decryptor identifies the reconfiguration...
US20100106972 SIGNALLING DELEGATION IN A MOVING NETWORK  
In order to delegate location update signaling responsibility from a Mobile Node to a Mobile Router, the Mobile Router is provided with a second symmetric key generated by a Mobile Node using a...
US20120070001 METHOD AND DEVICE FOR ARCHIVING A DOCUMENT  
The method for archiving a document includes a step of encryption of the document with a symmetric key, a step of transmission of said encrypted document to an archiving operator, and a step of...
US20070217603 Decryption key reuse in encrypted digital data stream distribution systems  
A data processing apparatus for a first encrypted digital datum in a digital data stream distributed in a distributed system. The apparatus includes a key extractor for obtaining a symmetric...
US20110013774 SIGNAL SECURITY IN A SATELLITE SIGNAL DISTRIBUTION ENVIRONMENT  
Certain embodiments provide a set top box, comprising: a processing entity configured to obtain data for a channel stacking switch, to obtain a security data element and to formulate a message for...
Matches 1 - 50 out of 143 1 2 3 >