Matches 1 - 50 out of 334 1 2 3 4 5 6 7 >

AcclaimIP-ad

Match Document Document Title
US20080002830 Method, system, and computer-readable medium to maintain and/or purge files of a document management system  
A method and corresponding apparatus and computer-readable medium to effect maintenance and/or purging of a document file in a multi-user document of file management system operating over a...
US20100046752 System and Method for Security Processing Media Streams  
A system for multi-stream security processing and distributing digital media streams includes a headend, a network, and at least one receiver. The headend is generally configured to generate...
US20090028337 Method and Apparatus for Providing Security in a Radio Frequency Identification System  
A method and apparatus involve storing in a tag a selected digital certificate that permits secure access to said tag from externally thereof.
US20080298591 Interoperable Systems and Methods for Peer-to-Peer Service Orchestration  
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich...
US20080301772 Authentication system and method, identification information inputting method and apparatus and portable terminal  
An authentication system in which unauthorized acquisition of the private information by a third party in the course of authentication of a user by a service provider is rendered difficult. In an...
US20130034229 SYSTEM AND METHOD FOR WIRELESS DATA PROTECTION  
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup...
US20100131411 Method for Secure Storage and Delivery of Media Content  
The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the...
US20080082837 Apparatus and method for continuous data protection in a distributed computing network  
A system for secure data storage and transmission is provided. The system comprises a first security module for protecting data in a first data at rest system and a second security moducle for...
US20080025515 Systems and Methods for Digitally-Signed Updates  
Certain embodiments of the present invention provide a cryptographic system that enables updates with digital signatures, the signatures being created using an improved digital signature scheme,...
US20130156195 METHOD OF OBTAINING A MAIN KEY FROM A MEMORY DEVICE, METHOD OF GENERATING AUTHENTICATION INFORMATION FOR A MEMORY DEVICE, AN EXTERNAL DEVICE AND SYSTEM ICLUDING THE EXTERNAL DEVICE  
In one embodiment, the method includes obtaining, at the external device, an encrypted main key and an encrypted first decryption key from the memory device. The encrypted first decryption key is...
US20060039565 Method of controlling transmission and reception of data including encrypted data stream  
A method of transmitting and receiving encryption channels which are needed to be encrypted includes encrypting only a part of channel data to be encrypted and transmitting the encrypted part in a...
US20050078830 Method for automated installation of digital certificates to network servers  
Disclosed herein are several digital certificate discovery and management systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description...
US20090092252 Method and System for Identifying and Managing Keys  
A system and method for managing encryption keys, wherein one of more of they keys incorporates a disabled state, and wherein the system further incorporates a namespace.
US20080279383 METHOD AND APPARATUS OF ENCIPHERING AND DECIPHERING DATA USING MULTIPLE KEYS  
On a recording medium, first information obtained by enciphering data with the first key and second information obtained by enciphering the first key with each of the predetermined second keys are...
US20080228650 SECURE COMMUNICATION AND REAL-TIME WATERMARKING USING MUTATING IDENTIFIERS  
A method of watermarking using mutating identifiers includes generating a plurality of watermarked versions of a content item, obtaining a plurality of keys for the plurality of watermarked...
US20080025514 Systems And Methods For Root Certificate Update  
Certain embodiments of the present invention provide a method for replacing a cryptographic key including receiving a key replacement message for replacing the cryptographic key, decrypting at...
US20050025316 Access control for digital content  
A recording arrangement operable to apply access control processing to input data content using a set of one or more content keys and to record access-controlled data content on a content storage...
US20060002561 Apparatus and/or method for encryption and/or decryption for multimedia data  
A multimedia device having an encryption module, which prevents an encryption key from being exposed to the outside, is provided. The multimedia device includes: a key processing unit, which...
US20140140512 REQUESTED AND ALLOWED CRYPTOGRAPHIC OPERATIONS COMPARISON  
Embodiments herein relate to cryptographic operations. A process identifier (PID) identifying a process requesting a cryptographic operation is received. Next, at least one allowed cryptographic...
US20100067699 INTEROPERABLE SYSTEMS AND METHODS FOR PEER-TO-PEER SERVICE ORCHESTRATION  
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich...
US20090300351 FAST SEARCHABLE ENCRYPTION METHOD  
The present invention provides a method, apparatus and system for fast searchable encryption. The data owner encrypts files and stores the ciphertext to the server. The data owner generates an...
US20050013440 Reception management apparatus, broadcasting receiving device, information distributing device, and information distributing method and reception management program  
There is disclosed a contract management apparatus connected to a plurality of broadcasting receiving devices which receive encrypted and broadcasted/distributed content information of a plurality...
US20110299687 AUTOMATED KEY MANAGEMENT SYSTEM AND METHOD  
A system and method for automatic key and certificate management is disclosed. In particular, a key store in a base computer contains both new and previously viewed cryptographic keys. In one...
US20070189541 Method and system for initialzing a key management system  
A network system for key management including a server, a key management system providing process logic for key management system initialization located on the server, a key management system...
US20060093149 Certified deployment of applications on terminals  
Embodiments of the present invention relate to secure deployment of software applications on transaction terminals using keys and certificates. In one embodiment, a method for electronically...
US20050008158 Key management device and method for providing security service in ethernet-based passive optical network  
A key management device and method which is required for provision of a security service in an EPON vulnerable to security breaches due to characteristics of Ethernet. A session key distribution...
US20120314865 NFC Communications Device for Setting Up Encrypted Email Communication  
NFC communication is utilized to provide methods, apparatus and systems for increasing the security of cryptographic keys and cryptographic processes. For the encryption and decryption of a...
US20100002883 SECURITY PROCEDURE AND APPARATUS FOR HANDOVER IN A 3GPP LONG TERM EVOLUTION SYSTEM  
A method and apparatus for implementing a security procedure during handover of a wireless transmit/receive unit (WTRU) in wireless communications that controls the behavior of a handover target...
US20090271762 BUSINESS SOFTWARE APPLICATION SYSTEM AND METHOD  
A business software application system and method are provided.
US20090193252 METHOD AND SYSTEM FOR SECURE PEER-TO-PEER COMMUNICATION  
The invention provides a server system, client, method and program element for distributing content in a peer-to-peer network. The server system spits a file into segments and makes copies of the...
US20090016535 Fuzzy Keys  
A method can be provided for performing encryption using a fuzzy key. The method can comprise generating a message, dividing a fuzzy key into a plurality of blocks; and generating an encrypted...
US20080181406 System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key  
Systems and methods of storage device data encryption and data access via a hardware key are described herein. One embodiment includes a hardware key intercepting a request sent from a host to a...
US20070127722 Method and apparatus for managing a key management system  
A network system for key management, including a server, a key management system providing process logic for key management system management located on the server, a key management system storage...
US20060088166 Authentication method and method device, system, and program for delivering secret information between proximity terminals  
To easily and simply perform authentication and delivery of secret information between devices which perform a short-range wireless communication. When a device including a short-range wireless...
US20050100166 Systems and methods for authenticating communications in a network medium  
A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels,...
US20130251152 KEY TRANSPORT PROTOCOL  
The invention enables the transport of a key from a sender to a receiver. The sender comprises means for generating or obtaining a virtual key and securing the virtual key to protect its...
US20120011360 KEY MANAGEMENT SYSTEMS AND METHODS FOR SHARED SECRET CIPHERS  
Various embodiments are described herein for a Key Management System (KMS) and associated methods for providing authentication and secure shared key distribution capabilities without revealing a...
US20070177740 ENCRYPTION KEY DISTRIBUTION SYSTEM, KEY DISTRIBUTION SERVER, LOCKING TERMINAL, VIEWING TERMINAL, ENCRYPTION KEY DISTRIBUTION METHOD, AND COMPUTER-READABLE MEDIUM  
It is aimed to provide an encryption key distribution system which can be easily operated, highly freely share the data therein, and achieve high reliability for authentication of one or more...
US20050074124 Management of SSL/TLS certificates  
Disclosed herein are several digital certificate discovery and management systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description...
US20110200193 METHOD AND APPARATUS FOR CONTROLLING THE RECHARGING OF ELECTRIC VEHICLES AND DETECTING STOLEN VEHICLES AND VEHICULAR COMPONENTS  
In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a...
US20100057884 BROWSER-BASED DOWNLOAD MANAGER  
A file download manager automatically controls how and where downloaded files are stored. A method for use in downloading a file includes establishing communications between a network site and a...
US20090175454 WIRELESS NETWORK HANDOFF KEY  
The present invention provides a method and system for handoff in a wireless communication network. In one embodiment, a common handoff encryption key is generated by an authentication server and...
US20090016533 Controlling With Rights Objects Delivery Of Broadcast Encryption Content For A Network Cluster From A Content Server Outside The Cluster  
Methods, systems, and products are disclosed for controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster that...
US20130208893 SHARING SECURE DATA  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing secure data are disclosed herein.
US20110276490 SECURITY SERVICE LEVEL AGREEMENTS WITH PUBLICLY VERIFIABLE PROOFS OF COMPLIANCE  
Techniques are described herein that are capable of providing security guarantees in security service level agreements (SLAB). For instance, a security SLA may specify a level of service to be...
US20100067705 DIGITAL RIGHTS MANAGEMENT ENGINE SYSTEMS AND METHODS  
Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected...
US20090268906 Method and System for Authorized Decryption of Encrypted Data  
The present invention relates to a method and a system for authorized decryption of encrypted data. First, the encrypted data is provided. Then the validity of at least two certificates is...
US20090129597 REMOTE PROVISIONING UTILIZING DEVICE IDENTIFIER  
Embodiments of the present invention provide for remote provisioning using a device identifier. In some embodiments, a client device may transmit the device identifier to a provisioning server...
US20080137865 System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media  
A secure software package for original equipment manufacturers to run in electronic devices in order to access and dynamically decrypt encrypted audio video or other content from a memory storage...
US20050120203 Methods, systems and computer program products for automatic rekeying in an authentication environment  
Rekeying in an authentication system including an authenticated data processing system and an authenticating data processing system is provided by the authenticating data processing system...
Matches 1 - 50 out of 334 1 2 3 4 5 6 7 >