Match
|
Document |
Document Title |
|
US20080002830 |
Method, system, and computer-readable medium to maintain and/or purge files of a document management system
A method and corresponding apparatus and computer-readable medium to effect maintenance and/or purging of a document file in a multi-user document of file management system operating over a... |
|
US20100046752 |
System and Method for Security Processing Media Streams
A system for multi-stream security processing and distributing digital media streams includes a headend, a network, and at least one receiver. The headend is generally configured to generate... |
|
US20090028337 |
Method and Apparatus for Providing Security in a Radio Frequency Identification System
A method and apparatus involve storing in a tag a selected digital certificate that permits secure access to said tag from externally thereof. |
|
US20080298591 |
Interoperable Systems and Methods for Peer-to-Peer Service Orchestration
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich... |
|
US20080301772 |
Authentication system and method, identification information inputting method and apparatus and portable terminal
An authentication system in which unauthorized acquisition of the private information by a third party in the course of authentication of a user by a service provider is rendered difficult. In an... |
|
US20130034229 |
SYSTEM AND METHOD FOR WIRELESS DATA PROTECTION
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup... |
|
US20100131411 |
Method for Secure Storage and Delivery of Media Content
The memory device contains control structures that allow media content to be stored securely and distributed in a manner envisioned by the content owner, or service providers involved in the... |
|
US20080082837 |
Apparatus and method for continuous data protection in a distributed computing network
A system for secure data storage and transmission is provided. The system comprises a first security module for protecting data in a first data at rest system and a second security moducle for... |
|
US20080025515 |
Systems and Methods for Digitally-Signed Updates
Certain embodiments of the present invention provide a cryptographic system that enables updates with digital signatures, the signatures being created using an improved digital signature scheme,... |
|
US20130156195 |
METHOD OF OBTAINING A MAIN KEY FROM A MEMORY DEVICE, METHOD OF GENERATING AUTHENTICATION INFORMATION FOR A MEMORY DEVICE, AN EXTERNAL DEVICE AND SYSTEM ICLUDING THE EXTERNAL DEVICE
In one embodiment, the method includes obtaining, at the external device, an encrypted main key and an encrypted first decryption key from the memory device. The encrypted first decryption key is... |
|
US20060039565 |
Method of controlling transmission and reception of data including encrypted data stream
A method of transmitting and receiving encryption channels which are needed to be encrypted includes encrypting only a part of channel data to be encrypted and transmitting the encrypted part in a... |
|
US20050078830 |
Method for automated installation of digital certificates to network servers
Disclosed herein are several digital certificate discovery and management systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description... |
|
US20090092252 |
Method and System for Identifying and Managing Keys
A system and method for managing encryption keys, wherein one of more of they keys incorporates a disabled state, and wherein the system further incorporates a namespace. |
|
US20080279383 |
METHOD AND APPARATUS OF ENCIPHERING AND DECIPHERING DATA USING MULTIPLE KEYS
On a recording medium, first information obtained by enciphering data with the first key and second information obtained by enciphering the first key with each of the predetermined second keys are... |
|
US20080228650 |
SECURE COMMUNICATION AND REAL-TIME WATERMARKING USING MUTATING IDENTIFIERS
A method of watermarking using mutating identifiers includes generating a plurality of watermarked versions of a content item, obtaining a plurality of keys for the plurality of watermarked... |
|
US20080025514 |
Systems And Methods For Root Certificate Update
Certain embodiments of the present invention provide a method for replacing a cryptographic key including receiving a key replacement message for replacing the cryptographic key, decrypting at... |
|
US20050025316 |
Access control for digital content
A recording arrangement operable to apply access control processing to input data content using a set of one or more content keys and to record access-controlled data content on a content storage... |
|
US20060002561 |
Apparatus and/or method for encryption and/or decryption for multimedia data
A multimedia device having an encryption module, which prevents an encryption key from being exposed to the outside, is provided. The multimedia device includes: a key processing unit, which... |
|
US20140140512 |
REQUESTED AND ALLOWED CRYPTOGRAPHIC OPERATIONS COMPARISON
Embodiments herein relate to cryptographic operations. A process identifier (PID) identifying a process requesting a cryptographic operation is received. Next, at least one allowed cryptographic... |
|
US20100067699 |
INTEROPERABLE SYSTEMS AND METHODS FOR PEER-TO-PEER SERVICE ORCHESTRATION
Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich... |
|
US20090300351 |
FAST SEARCHABLE ENCRYPTION METHOD
The present invention provides a method, apparatus and system for fast searchable encryption. The data owner encrypts files and stores the ciphertext to the server. The data owner generates an... |
|
US20050013440 |
Reception management apparatus, broadcasting receiving device, information distributing device, and information distributing method and reception management program
There is disclosed a contract management apparatus connected to a plurality of broadcasting receiving devices which receive encrypted and broadcasted/distributed content information of a plurality... |
|
US20110299687 |
AUTOMATED KEY MANAGEMENT SYSTEM AND METHOD
A system and method for automatic key and certificate management is disclosed. In particular, a key store in a base computer contains both new and previously viewed cryptographic keys. In one... |
|
US20070189541 |
Method and system for initialzing a key management system
A network system for key management including a server, a key management system providing process logic for key management system initialization located on the server, a key management system... |
|
US20060093149 |
Certified deployment of applications on terminals
Embodiments of the present invention relate to secure deployment of software applications on transaction terminals using keys and certificates. In one embodiment, a method for electronically... |
|
US20050008158 |
Key management device and method for providing security service in ethernet-based passive optical network
A key management device and method which is required for provision of a security service in an EPON vulnerable to security breaches due to characteristics of Ethernet. A session key distribution... |
|
US20120314865 |
NFC Communications Device for Setting Up Encrypted Email Communication
NFC communication is utilized to provide methods, apparatus and systems for increasing the security of cryptographic keys and cryptographic processes. For the encryption and decryption of a... |
|
US20100002883 |
SECURITY PROCEDURE AND APPARATUS FOR HANDOVER IN A 3GPP LONG TERM EVOLUTION SYSTEM
A method and apparatus for implementing a security procedure during handover of a wireless transmit/receive unit (WTRU) in wireless communications that controls the behavior of a handover target... |
|
US20090271762 |
BUSINESS SOFTWARE APPLICATION SYSTEM AND METHOD
A business software application system and method are provided. |
|
US20090193252 |
METHOD AND SYSTEM FOR SECURE PEER-TO-PEER COMMUNICATION
The invention provides a server system, client, method and program element for distributing content in a peer-to-peer network. The server system spits a file into segments and makes copies of the... |
|
US20090016535 |
Fuzzy Keys
A method can be provided for performing encryption using a fuzzy key. The method can comprise generating a message, dividing a fuzzy key into a plurality of blocks; and generating an encrypted... |
|
US20080181406 |
System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key
Systems and methods of storage device data encryption and data access via a hardware key are described herein. One embodiment includes a hardware key intercepting a request sent from a host to a... |
|
US20070127722 |
Method and apparatus for managing a key management system
A network system for key management, including a server, a key management system providing process logic for key management system management located on the server, a key management system storage... |
|
US20060088166 |
Authentication method and method device, system, and program for delivering secret information between proximity terminals
To easily and simply perform authentication and delivery of secret information between devices which perform a short-range wireless communication. When a device including a short-range wireless... |
|
US20050100166 |
Systems and methods for authenticating communications in a network medium
A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels,... |
|
US20130251152 |
KEY TRANSPORT PROTOCOL
The invention enables the transport of a key from a sender to a receiver. The sender comprises means for generating or obtaining a virtual key and securing the virtual key to protect its... |
|
US20120011360 |
KEY MANAGEMENT SYSTEMS AND METHODS FOR SHARED SECRET CIPHERS
Various embodiments are described herein for a Key Management System (KMS) and associated methods for providing authentication and secure shared key distribution capabilities without revealing a... |
|
US20070177740 |
ENCRYPTION KEY DISTRIBUTION SYSTEM, KEY DISTRIBUTION SERVER, LOCKING TERMINAL, VIEWING TERMINAL, ENCRYPTION KEY DISTRIBUTION METHOD, AND COMPUTER-READABLE MEDIUM
It is aimed to provide an encryption key distribution system which can be easily operated, highly freely share the data therein, and achieve high reliability for authentication of one or more... |
|
US20050074124 |
Management of SSL/TLS certificates
Disclosed herein are several digital certificate discovery and management systems. Detailed information on various example embodiments of the inventions are provided in the Detailed Description... |
|
US20110200193 |
METHOD AND APPARATUS FOR CONTROLLING THE RECHARGING OF ELECTRIC VEHICLES AND DETECTING STOLEN VEHICLES AND VEHICULAR COMPONENTS
In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a... |
|
US20100057884 |
BROWSER-BASED DOWNLOAD MANAGER
A file download manager automatically controls how and where downloaded files are stored. A method for use in downloading a file includes establishing communications between a network site and a... |
|
US20090175454 |
WIRELESS NETWORK HANDOFF KEY
The present invention provides a method and system for handoff in a wireless communication network. In one embodiment, a common handoff encryption key is generated by an authentication server and... |
|
US20090016533 |
Controlling With Rights Objects Delivery Of Broadcast Encryption Content For A Network Cluster From A Content Server Outside The Cluster
Methods, systems, and products are disclosed for controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster that... |
|
US20130208893 |
SHARING SECURE DATA
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for managing secure data are disclosed herein. |
|
US20110276490 |
SECURITY SERVICE LEVEL AGREEMENTS WITH PUBLICLY VERIFIABLE PROOFS OF COMPLIANCE
Techniques are described herein that are capable of providing security guarantees in security service level agreements (SLAB). For instance, a security SLA may specify a level of service to be... |
|
US20100067705 |
DIGITAL RIGHTS MANAGEMENT ENGINE SYSTEMS AND METHODS
Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected... |
|
US20090268906 |
Method and System for Authorized Decryption of Encrypted Data
The present invention relates to a method and a system for authorized decryption of encrypted data. First, the encrypted data is provided. Then the validity of at least two certificates is... |
|
US20090129597 |
REMOTE PROVISIONING UTILIZING DEVICE IDENTIFIER
Embodiments of the present invention provide for remote provisioning using a device identifier. In some embodiments, a client device may transmit the device identifier to a provisioning server... |
|
US20080137865 |
System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media
A secure software package for original equipment manufacturers to run in electronic devices in order to access and dynamically decrypt encrypted audio video or other content from a memory storage... |
|
US20050120203 |
Methods, systems and computer program products for automatic rekeying in an authentication environment
Rekeying in an authentication system including an authenticated data processing system and an authenticating data processing system is provided by the authenticating data processing system... |