Match
|
Document |
Document Title |
|
US20100310078 |
SYSTEM FOR USER-CENTRIC IDENTITY MANAGEMENT AND METHOD THEREOF
A user terminal for a user-centric identity management system includes: a browser that requests a service to the service provider server and receives a service parameter in which a plurality of... |
|
US20120008786 |
APPARATUS AND METHODS FOR CONTENT DELIVERY AND MESSAGE EXCHANGE ACROSS MULTIPLE CONTENT DELIVERY NETWORKS
Methods and apparatus for providing protected content to subscribers of a managed (e.g., MSO) network via a content source accessible via an internetwork such as the Internet. In one embodiment, a... |
|
US20110142242 |
QUANTUM PUBLIC KEY ENCRYPTION SYSTEM, KEY GENERATION APPARATUS, ENCRYPTION APPARATUS, DECRYPTION APPARATUS, KEY GENERATION METHOD, ENCRYPTION METHOD, AND DECRYPTION METHOD
Provided is a key generation apparatus that generates, based on a generated random number, quantum gates Ui, L and R corresponding respectively to m types of unitary operations Ui corresponding to... |
|
US20140369501 |
Demand Based Encryption and Key Generation and Distribution Systems and Methods
Systems and methods providing a key management platform that generates and distributes demand-based encryption and decryption keys are described. |
|
US20120072728 |
RETRIEVING AND USING CLOUD BASED STORAGE CREDENTIALS
The present invention extends to methods, systems, and computer program products for retrieving and using cloud based storage credentials. Embodiments of the invention include automatically... |
|
US20120183144 |
KEY MANAGEMENT SYSTEM AND METHODS FOR DISTRIBUTED SOFTWARE
A key management system for distributed software applications includes a communication network and one or more software applications coupled to the communication network. The one or more software... |
|
US20140064491 |
METHOD OF PERFORMING XZ-ELLIPTIC CURVE CRYPTOGRAPHY FOR USE WITH NETWORK SECURTIY PROTOCOLS
The method of performing XZ-elliptic curve cryptography for use with network security protocols provides a computerized method that allows for the encryption of messages through elliptic... |
|
US20100128879 |
FLEXIBLE MANAGEMENT OF SECURITY FOR MULTI-USER ENVIRONMENTS
One embodiment is a method including computing or storing an access control polynomial. Further embodiments include systems and computer readable media including an access control polynomial.... |
|
US20120250868 |
MIX-NET SYSTEM
Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a... |
|
US20140105403 |
METHOD AND APPARATUS FOR PUBLIC-KEY CRYPTOGRAPHY BASED ON ERROR CORRECTING CODES
Methods and apparatus for generating a private-public key pair, for encrypting a message for transmission through an unsecure communication medium (30), and for decrypting the message are... |
|
US20100306530 |
WORKGROUP KEY WRAPPING FOR COMMUNITY OF INTEREST MEMBERSHIP AUTHENTICATION
Methods and systems for managing a community of interest are disclosed. One method includes creating a workgroup key associated with a community of interest, and protecting one or more resources... |
|
US20110164753 |
Digital Rights Management For Media Streams
This document describes techniques and apparatuses enabling application of digital rights management (DRM) to media streams. In one embodiment, three license levels are used to protect numerous... |
|
US20080095375 |
Secret information management apparatus and secret information management system
In a secret information management system, a secret information management apparatus comprises a secret distribution unit which secretly distributes a data key k using a (k, n) threshold secret... |
|
US20050213769 |
Cryptographic method and devices for facilitating calculations during transactions
The cryptographic method is used in transactions for which a first entity generates, by means of a private RSA key, a proof verifiable by a second entity by means of a public RSA key associated... |
|
US20110038483 |
SYSTEMS AND METHODS FOR SECURE MANAGEMENT OF PRESENCE INFORMATION FOR COMMUNICATION SERVICES
Systems and methods are provided for managing user information comprising presence information, wherein authentication of requesting parties is based on public-private key pair encryption and key... |
|
US20090268915 |
Secure Creation and Management of Device Ownership Keys
Secure creation and management of device ownership keys. TPM ownership keys are generated by cryptographically combining manufacturer information with device specific information. Ownership keys... |
|
US20110255692 |
POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES
Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between... |
|
US20150215118 |
ROLE-BASED DISTRIBUTED KEY MANAGEMENT
Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update... |
|
US20140270179 |
METHOD AND SYSTEM FOR KEY GENERATION, BACKUP, AND MIGRATION BASED ON TRUSTED COMPUTING
The present invention relates to the field of computer technologies and discloses a method and a system for key generation, backup, and migration based on trusted computing, including: receiving a... |
|
US20150236851 |
METHOD AND APPARATUS FOR UPDATING CA PUBLIC KEY, UE AND CA
A method and an apparatus for updating a public key, a UE and a CA are disclosed. The method includes: receiving a first message including CA public key information, where the CA public key... |
|
US20060059367 |
Radio frequency identification tag lock and key
Briefly, in accordance with one embodiment of the invention, a radio frequency identification tag system includes a lock tag to secure an item or an area, and one or more key tags associated with... |
|
US20080137859 |
PUBLIC KEY PASSING
An improved approach to public key passing is provided to inhibit man-in-the-middle (MITM) attacks during an exchange of public keys over one or more public networks. In one embodiment, a method... |
|
US20070086592 |
Determining the reputation of a sender of communications
A method and system for determining the reputation of a sender for sending desirable communications is provided. The reputation system identifies senders of communications by keys sent along with... |
|
US20080159543 |
Public Key Cryptographic Method And System, Certification Server And Memories Adapted For Said System
The invention relates to a public key cryptographic method and system, a certification server and memories adapted for said system. In said public key cryptographic system, there is insufficient... |
|
US20110099591 |
SECURE WIRELESS PAIRING OF DIGITAL TV SHORT-RANGE TRANSMITTER AND RECEIVER
Embodiments of wireless display of digital content include transmission using a television transmission standard, such as a set of standards defined by the Advanced Television Systems Committee... |
|
US20080095374 |
Method And System For Setting Up A Secure Environment In Wireless Universal Plug And Play (Upnp) Networks
The invention describes a method of setting up a secure environment in wireless Universal Plug and Play (UPnP) networks, comprising a UPnP security console and UPnP controlled devices defined in... |
|
US20100138659 |
ELECTRONIC NOTARY
A process is disclosed for notarizing document, by a client in the presence of a notary, comprising the steps of registering the notary, the client and the document, from a local workstation... |
|
US20090099967 |
HEALTH CARE SYSTEM, KEY MANAGEMENT SERVER AND METHOD FOR MANAGING KEY, AND ENCRYPTING DEVICE AND METHOD FOR ENCRYPTING VITAL SIGN DATA
Provided is a health care system including a key management server that receives from a server a request for a decryption key, with first identification information identifying a measuring... |
|
US20090154709 |
MIGRATION OF COMPUTER SECRETS
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical source computing machine to a physically... |
|
US20090037728 |
Authentication System, CE Device, Mobile Terminal, Key Certificate Issuing Station, And Key Certificate Acquisition Method
Provided is an authentication system for improving user-friendliness. An IC card (100) of the authentication system (10) includes: a key/certificate storage unit (120) connected to a terminal... |
|
US20110103589 |
KEY DISTRIBUTING METHOD, PUBLIC KEY OF KEY DISTRIBUTION CENTRE ONLINE UPDATING METHOD AND DEVICE
A key distributing method, a public key of key distribution centre online updating method, a key distribution centre, a communication entity and a key management system. The system includes:... |
|
US20100067702 |
KEY GENERATION DEVICE, ENCRYPTION DEVICE, RECEPTION DEVICE, KEY GENERATION METHOD, KEY PROCESSING METHOD, AND PROGRAM
A key generation device according to the present invention hierarchically constructs a Y-ary tree structure where n reception devices are assigned to leaves, and forms subgroups where individual... |
|
US20110211700 |
DEVICE AND METHOD FOR SECURITY KEY EXCHANGE AND SYSTEM PERTAINING TO SAME
The present invention relates to a device and method that enable a security key to be shared using security key exchange between two terminals, and a system that supports the same. To achieve the... |
|
US20120300940 |
DYNAMIC KEY MANAGEMENT
Apparatus, systems, and methods may operate to receive a public key associated with a public/private key pair at a key distribution handler, after a new workload and an associated key agent are... |
|
US20050144634 |
Method for providing pay-TV service based on session key
Disclosed is a method for providing a pay-TV service based on a session key. The method includes the steps of: selecting a desired pay event using a program guide displayed on a system of the... |
|
US20110158412 |
INFORMATION DISCLOSURE APPARATUS
An information tray creation apparatus generates a pair of an encryption key and a decoding key, encrypts disclosure information using the encryption key, and generates encrypted disclosure... |
|
US20120079279 |
Generation of SW Encryption Key During Silicon Manufacturing Process
A method of generating an encryption key during the manufacturing process of a device includes randomly generating a seed, encrypting a unique identifier disposed in the device to obtain a first... |
|
US20110029773 |
Optical Network Terminal Management Control Interface-Based Passive Optical Network Security Enhancement
A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical... |
|
US20090150978 |
ACCESS CONTROL OF CONTENT SYNDICATION
A content syndication access control solution is provided. An illustrative content syndication access control system comprises: a syndication subscriber for acquiring a authorized content... |
|
US20080292105 |
LIGHTWEIGHT KEY DISTRIBUTION AND MANAGEMENT METHOD FOR SENSOR NETWORKS
A lightweight security framework is disclosed that combines PKI with symmetric key cryptography to exploit the system asymmetry in hierarchical sensor networks. The framework provides protocols... |
|
US20150003615 |
KEY AGREEMENT PROTOCOL
The present invention relates to data communication systems and protocols utilized in such systems. |
|
US20090276630 |
Group Signature System And Information Processing Method
In a group signature system of the present invention, user device 400 registered in the group, when receiving an issuing device public key of a set that includes order N of a cyclic group and its... |
|
US20090232315 |
UNIFIED AND PERSISTENT SYSTEM AND METHOD FOR AUTOMATIC CONFIGURATION OF ENCRYPTION
A system and method for database security provides, a database security method that receives an encryption property from an application and receives information relating to a database server. The... |
|
US20090187760 |
Security Mechanism within a Local Area Network
A local area network server may issue security certificates to client devices on the network for two-way authentication across the network. The certificates may be issued through a transaction... |
|
US20080118070 |
Open and distributed systems to provide secure email service
A system to ease secure email communication by providing a unique email address of a user's choice, along with a private and public key pair which are generated and then associated with the email... |
|
US20120288096 |
SECURITY KEY DISTRIBUTION IN A CLUSTER
Provided are techniques for the fast and reliable distribution of security keys within a cluster of computing devices, or computers. One embodiment provides a method for secure distribution of... |
|
US20050091681 |
Systems and methods for video storage and display
Systems and methods for cost effectively making video content available to users are disclosed. In particular, a prescient abundant viewer (PAW) is described. A PAW includes a content receiver, a... |
|
US20120257758 |
STRENGTHENED PUBLIC KEY PROTOCOL
A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private... |
|
US20100023757 |
METHODS AND SYSTEMS FOR SENDING SECURE ELECTRONIC DATA
A method and system for providing encryption are provided, involving a) transmitting a request from a sender to a database for a public key for a selected recipient, the database being configured... |
|
US20090086980 |
ENABLING A SECURE OEM PLATFORM FEATURE IN A COMPUTING ENVIRONMENT
A platform feature licensing module (e.g., a USB Smart Card Token) securely stores and communicates a platform feature enabling license, corresponding to a selectable platform feature, to an... |