Matches 1 - 50 out of 326 1 2 3 4 5 6 7 >


Match Document Document Title
US20130124853 DIGITAL RIGHTS MANAGEMENT DISTRIBUTION SYSTEM  
In an example embodiment, a digital content distributor may transmit an unsigned license associated with a protected digital object to a digital rights management provider. The digital rights...
US20110116636 Intelligent File Encapsulation  
An improved network-based system and network implemented method of distributing and controlling the release of an encapsulated content. The system comprising an archive creation tool configured to...
US20110131414 METHODS AND SYSTEMS FOR END-TO-END SECURE SIP PAYLOADS  
Methods, systems and communication nodes for protecting Session Initiation Protocol (SIP) message payloads are described. Different protection techniques can be used to protect SIP payloads...
US20120051543 System and method for providing synchronized broadcast and simulcast of media content  
A system and method of receiving a radio broadcast and simulcast of media content, including: receiving a digital radio broadcast comprising digital radio content over a terrestrial radio...
US20110213965 IDENTITY MANAGEMENT CERTIFICATE OPERATIONS  
A method and system for identity management certificate operations is described.
US20120281840 METHOD AND SYSTEM FOR PACING, ACKING, TIMING, AND HANDICAPPING (PATH) FOR SIMULTANEOUS RECEIPT OF DOCUMENTS EMPLOYING ENCRYPTION  
A method of facilitating substantially simultaneous receipt of electronic content by a plurality of intended recipients is disclosed. The electronic content is encrypted. The encrypted electronic...
US20110033054 METHOD FOR DISTRIBUTING ENCRYPTION MEANS  
The present invention relates to method for operating a trust centre for distributing key material to at least one radio station, comprising the steps of at the trust centre, dividing an...
US20100325693 REMOTE AUTHORIZATION FOR OPERATIONS  
Techniques for the remote authorization of secure operations are provided. A secure security system restricts access to a secure operation via an access key. An authorization acquisition service...
US20100333130 SYSTEMS AND METHODS FOR VERIFYING RECEIPT OF BROADCAST TRANSMISSIONS PRIOR TO BILLING  
Methods and systems allow mobile TV broadcast service providers to verify reception of broadcast transmissions to mobile devices prior to billing for such services. When a request for a broadcast...
US20080181412 CRYPTOGRAPHIC KEY CONTAINERS ON A USB TOKEN  
A Universal Serial Bus (USB) compatible storage device is utilized as a security token for storage of cryptographic keys. A cryptographic subsystem of a processor accesses cryptographic keys in...
US20080037792 HOME NETWORK SYSTEMS  
A method and system for key management and distribution are disclosed. A network can comprise plurality of stations, each station is dedicated to a network device and is configured to plug into an...
US20110243331 SHARED RANDOM NUMBERS MANAGEMENT METHOD AND MANAGEMENT SYSTEM IN SECRET COMMUNICATION NETWORK  
In a secret communication network including a center node and multiple remote nodes, the center node is provided with a virtual remote node which functions as a remote node similar to each of the...
US20100316221 SECURE TRANSMISSION METHOD FOR BROADBAND WIRELESS MULTIMEDIA NETWORK BROADCASTING COMMUNICATION  
A secure transmission method for broadband wireless multimedia network broadcasting communication includes the following steps: a secure channel between big base station and small base station is...
US20120204028 Secure Kerberized Access of Encrypted File System  
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session...
US20120155646 SUPPORTING DNS SECURITY IN A MULTI-MASTER ENVIRONMENT  
Multiple peer domain name system (DNS) servers are included in a multi-master DNS environment. One of the multiple peer DNS servers is a key master peer DNS server that generates one or more keys...
US20110295708 SYSTEMS AND METHODS FOR PROVIDING SOFTWARE RENTAL SERVICES TO DEVICES CONNECTED TO A NETWORK  
Methods and computer readable media for providing a rental service for a software application via a network. The user of a device downloads a rental agent application via the network and installs...
US20130129095 Key Delivery  
A multi-hierarchical key system is provided such that users receive timely key renewals when required so that access to authorized content is not disrupted. Timely renewals of keys may occur...
US20100306527 CONTROLLING THE VALIDITY PERIOD OF A DECRYPTION KEY  
The invention provides a method and a system for allowing access to a digital broadcast stream on a client device in a conditional access system, wherein the start time and end time of events in...
US20110033047 BRIDGED CRYPTOGRAPHIC VLAN  
The invention comprises three extensions of the IEEE 802.1Q VLAN bridge model. The first extension is the cryptographic separation of VLANs over trunk links. A LAN segment type referred to as an...
US20120066764 METHOD AND APPARATUS FOR ENHANCING SECURITY IN A ZIGBEE WIRELESS COMMUNICATION PROTOCOL  
The present invention relates to a technique for solving security vulnerability of a ZigBee wireless communication protocol frequently used as a low-power wireless communication protocol in a home...
US20100017602 Ad-Hoc Trust Establishment Using Visual Verification  
Methods for ad-hoc trust establishment using visual verification are described. In a first embodiment, a visual representation of a shared data is generated on two or more devices and the visual...
US20090060201 Secure Peer-to-Peer Distribution of an Updatable Keyring  
A distributed peer-to-peer document archive system provides version-control, security, access control, linking among stored documents and remote access to documents usually associated with...
US20090110199 Toolbar Signature  
A method and system are provided for a web browser toolbar signature. In one example, the method includes receiving a submission of user content from a source webpage, receiving a producer...
US20140095864 REDUCED AUTHENTICATION TIMES IN CONSTRAINED COMPUTER NETWORKS  
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node may dynamically correlate the...
US20080205654 Method and Security System for the Secure and Unequivocal Encoding of a Security Module  
The present invention relates to a method and a security system for the secure and unequivocal encoding of a security module, in particular a chip card. To this end, a security module (10) is...
US20080031459 Systems and Methods for Identity-Based Secure Communications  
Methods and systems for securing communications between networked computer agents in a positively identifiable manner, using a centralized arbitration computer agent that acts as a trusted third...
US20090282244 MEDICAL DEVICE RIGHTS AND RECALL MANAGEMENT SYSTEM  
The embodiments provide systems and methods for medical device rights and recall management system. A digital IP rights and recall management device activates a central key server to authenticate...
US20100329465 METHOD OF TRIGGERING A KEY DELIVERY FROM A MESH KEY DISTRIBUTOR  
A mesh station applying for access to a network includes a list of peer stations in messages of an authenticated key establishment protocol. A mesh key distributor derives a key delivery key and...
US20110194697 MULTICASE KEY DISTRIBUTION METHOD, UPDATED METHOD, AND BASE STATION BASED ON UNICAST CONVERSATION KEY  
A multicast key distribution method, an update method, and a base station based on unicast conversation key, the distribution method includes the following steps: 1) the base station composes...
US20140233740 Secure Distribution of Content  
Methods and systems are described for secure delivery of a content item from at least a first content distribution network (CDN1) to at least one content receiving entity using a split-key...
US20090268915 Secure Creation and Management of Device Ownership Keys  
Secure creation and management of device ownership keys. TPM ownership keys are generated by cryptographically combining manufacturer information with device specific information. Ownership keys...
US20110069839 AUTHENTICATION INFORMATION GENERATING SYSTEM, AUTHENTICATION INFORMATION GENERATING METHOD, CLIENT APPARATUS, AND AUTHENTICATION INFORMATION GENERATING PROGRAM FOR IMPLEMENTING THE METHOD  
A secret information server 300 on a network 10 and a client apparatus 100 constitute an authentication information generating system. The secret information server 300 has a function to confirm...
US20090129599 HIERARCHICAL DETERMINISTIC PAIRWISE KEY PREDISTRIBUTION SCHEME  
A security system for a hierarchical network (10) includes L hierarchical levels each corresponding to a security domain level (16), and a plurality of local network nodes (A, B, . . . , Z). A...
US20150245202 SECURE DISTRIBUTION OF A COMMON NETWORK KEY IN A WIRELESS NETWORK  
Methods, devices, and systems are described to enable generating and securely distributing a common network key in a wireless network. For example, instead of each station of the wireless network...
US20090144542 SYSTEM FOR DISTRIBUTING DIGITAL MEDIA TO EXHIBITORS  
A system for packaging digital media and distributing digital media to exhibitors is described, which system enables distribution by utilizing media content booking, media content packaging,...
US20120300939 KEY MANAGEMENT AND NODE AUTHENTICATION METHOD FOR SENSOR NETWORK  
A key management and node authentication method for a sensor network is disclosed. The method comprises the following steps of: 1) keys pre-distribution: before deploying the network,...
US20090217032 METHOD FOR GENERATING SAK, METHOD FOR REALIZING MAC SECURITY, AND NETWORK DEVICE  
A method for generating a secure association key (SAK), a method for realizing medium access control security (MACsec) and a network device are provided. The method for generating an SAK includes...
US20090151000 LICENSE MANAGEMENT DEVICE AND METHOD  
Security is secured according to the type of a license so that unnecessary processing load is reduced. A license accumulation control unit (102) and a license transfer control unit (103)...
US20120030467 METHODS AND SYSTEMS FOR FACILITATING COMMUNICATIONS BETWEEN VEHICLES AND SERVICE PROVIDERS  
Methods and systems for facilitating communications between a vehicle and a service provider are provided. A first address of a vehicle communication device and a second address of a service...
US20100005302 TECHNIQUES FOR VALIDATING AND SHARING SECRETS  
Techniques for validating and sharing secrets are presented. A secret is divided into a plurality of parts. Each part is represented by a unique value. Each value is distributed to a unique user...
US20110185181 NETWORK AUTHENTICATION METHOD AND DEVICE FOR IMPLEMENTING THE SAME  
A network authentication method is to be implemented using a network authentication device and a user end for authenticating the user end. The network authentication method includes the steps of:...
US20120063601 SYSTEMS AND METHODS FOR REMOTELY LOADING ENCRYPTION KEYS IN CARD READER SYSTEMS  
Systems and methods for remotely loading encryption keys in card reader systems are provided. One such method includes storing, at a card reader, a device identification number for identifying the...
US20090279704 MOBILE INTERNET PROTOCOL SYSTEM AND METHOD FOR UPDATING HOME AGENT ROOT KEY  
A MIP system and a method for updating an HA-RK are disclosed. The AAA server generates and delivers a new HA-RK before expiry of the old HA-RK, thus eliminating the time gap between expiry of the...
US20110255696 KEY DISTRIBUTION METHOD AND SYSTEM  
The present invention discloses a key distribution method and system, and the method includes: a card issuer management platform generating initial keys of a supplementary security domain...
US20110302410 SECURE DOCUMENT DELIVERY  
A method, machine-readable medium, and server to create a key, set an expiration event for the key to expire, send the key to a first client device to encrypt the document, authenticate a second...
US20050157880 Computer system having an autonomous process for centralized cryptographic key administration  
In scalable multi-process and possibly multi-node application environments, the management of sensitive data, such as cryptographic keys, is complicated by the number of processes, the frequency...
US20100329464 SYSTEMS AND METHODS FOR IMPLEMENTING SUPPLY CHAIN VISIBILITY POLICIES  
Methods, storage medium and systems for implementing visibility policies within a supply chain include storing event data on a computer-readable storage medium of a first partner, the event data...
US20130044882 Enhancing provisioning for keygroups using key management interoperability protocol (KMIP)  
A key management protocol (such as Key Management Interoperability Protocol (KMIP)) is extended via set of one or more custom attributes to provide a mechanism by which clients pass additional...
US20100217986 AUTHENTICATED SECRET SHARING  
A method and system distributes N shares of a secret among cooperating entities by forming a mathematical construct that has an embedded internal structure to allow authentication of a...
US20100217967 REAL-TIME COMMUNICATION SECURITY FOR AUTOMATION NETWORKS  
A framework, device and method are disclosed for providing broadcast communication security over Ethernet within an automation system, wherein a security plug provides secure working of the...

Matches 1 - 50 out of 326 1 2 3 4 5 6 7 >