Matches 1 - 50 out of 131 1 2 3 >


Match Document Document Title
US20100310078 SYSTEM FOR USER-CENTRIC IDENTITY MANAGEMENT AND METHOD THEREOF  
A user terminal for a user-centric identity management system includes: a browser that requests a service to the service provider server and receives a service parameter in which a plurality of...
US20120008786 APPARATUS AND METHODS FOR CONTENT DELIVERY AND MESSAGE EXCHANGE ACROSS MULTIPLE CONTENT DELIVERY NETWORKS  
Methods and apparatus for providing protected content to subscribers of a managed (e.g., MSO) network via a content source accessible via an internetwork such as the Internet. In one embodiment, a...
US20110142242 QUANTUM PUBLIC KEY ENCRYPTION SYSTEM, KEY GENERATION APPARATUS, ENCRYPTION APPARATUS, DECRYPTION APPARATUS, KEY GENERATION METHOD, ENCRYPTION METHOD, AND DECRYPTION METHOD  
Provided is a key generation apparatus that generates, based on a generated random number, quantum gates Ui, L and R corresponding respectively to m types of unitary operations Ui corresponding to...
US20140369501 Demand Based Encryption and Key Generation and Distribution Systems and Methods  
Systems and methods providing a key management platform that generates and distributes demand-based encryption and decryption keys are described.
US20120072728 RETRIEVING AND USING CLOUD BASED STORAGE CREDENTIALS  
The present invention extends to methods, systems, and computer program products for retrieving and using cloud based storage credentials. Embodiments of the invention include automatically...
US20120183144 KEY MANAGEMENT SYSTEM AND METHODS FOR DISTRIBUTED SOFTWARE  
A key management system for distributed software applications includes a communication network and one or more software applications coupled to the communication network. The one or more software...
US20140064491 METHOD OF PERFORMING XZ-ELLIPTIC CURVE CRYPTOGRAPHY FOR USE WITH NETWORK SECURTIY PROTOCOLS  
The method of performing XZ-elliptic curve cryptography for use with network security protocols provides a computerized method that allows for the encryption of messages through elliptic...
US20100128879 FLEXIBLE MANAGEMENT OF SECURITY FOR MULTI-USER ENVIRONMENTS  
One embodiment is a method including computing or storing an access control polynomial. Further embodiments include systems and computer readable media including an access control polynomial....
US20120250868 MIX-NET SYSTEM  
Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a...
US20140105403 METHOD AND APPARATUS FOR PUBLIC-KEY CRYPTOGRAPHY BASED ON ERROR CORRECTING CODES  
Methods and apparatus for generating a private-public key pair, for encrypting a message for transmission through an unsecure communication medium (30), and for decrypting the message are...
US20100306530 WORKGROUP KEY WRAPPING FOR COMMUNITY OF INTEREST MEMBERSHIP AUTHENTICATION  
Methods and systems for managing a community of interest are disclosed. One method includes creating a workgroup key associated with a community of interest, and protecting one or more resources...
US20110164753 Digital Rights Management For Media Streams  
This document describes techniques and apparatuses enabling application of digital rights management (DRM) to media streams. In one embodiment, three license levels are used to protect numerous...
US20080095375 Secret information management apparatus and secret information management system  
In a secret information management system, a secret information management apparatus comprises a secret distribution unit which secretly distributes a data key k using a (k, n) threshold secret...
US20050213769 Cryptographic method and devices for facilitating calculations during transactions  
The cryptographic method is used in transactions for which a first entity generates, by means of a private RSA key, a proof verifiable by a second entity by means of a public RSA key associated...
US20110038483 SYSTEMS AND METHODS FOR SECURE MANAGEMENT OF PRESENCE INFORMATION FOR COMMUNICATION SERVICES  
Systems and methods are provided for managing user information comprising presence information, wherein authentication of requesting parties is based on public-private key pair encryption and key...
US20090268915 Secure Creation and Management of Device Ownership Keys  
Secure creation and management of device ownership keys. TPM ownership keys are generated by cryptographically combining manufacturer information with device specific information. Ownership keys...
US20110255692 POWER SAVINGS THROUGH COOPERATIVE OPERATION OF MULTIRADIO DEVICES  
Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between...
US20150215118 ROLE-BASED DISTRIBUTED KEY MANAGEMENT  
Implementations for providing role-based distributed key management (DKM) replication are described. A server node receives a request from a requester node to perform a DKM create or update...
US20140270179 METHOD AND SYSTEM FOR KEY GENERATION, BACKUP, AND MIGRATION BASED ON TRUSTED COMPUTING  
The present invention relates to the field of computer technologies and discloses a method and a system for key generation, backup, and migration based on trusted computing, including: receiving a...
US20150236851 METHOD AND APPARATUS FOR UPDATING CA PUBLIC KEY, UE AND CA  
A method and an apparatus for updating a public key, a UE and a CA are disclosed. The method includes: receiving a first message including CA public key information, where the CA public key...
US20060059367 Radio frequency identification tag lock and key  
Briefly, in accordance with one embodiment of the invention, a radio frequency identification tag system includes a lock tag to secure an item or an area, and one or more key tags associated with...
US20080137859 PUBLIC KEY PASSING  
An improved approach to public key passing is provided to inhibit man-in-the-middle (MITM) attacks during an exchange of public keys over one or more public networks. In one embodiment, a method...
US20070086592 Determining the reputation of a sender of communications  
A method and system for determining the reputation of a sender for sending desirable communications is provided. The reputation system identifies senders of communications by keys sent along with...
US20080159543 Public Key Cryptographic Method And System, Certification Server And Memories Adapted For Said System  
The invention relates to a public key cryptographic method and system, a certification server and memories adapted for said system. In said public key cryptographic system, there is insufficient...
US20110099591 SECURE WIRELESS PAIRING OF DIGITAL TV SHORT-RANGE TRANSMITTER AND RECEIVER  
Embodiments of wireless display of digital content include transmission using a television transmission standard, such as a set of standards defined by the Advanced Television Systems Committee...
US20080095374 Method And System For Setting Up A Secure Environment In Wireless Universal Plug And Play (Upnp) Networks  
The invention describes a method of setting up a secure environment in wireless Universal Plug and Play (UPnP) networks, comprising a UPnP security console and UPnP controlled devices defined in...
US20100138659 ELECTRONIC NOTARY  
A process is disclosed for notarizing document, by a client in the presence of a notary, comprising the steps of registering the notary, the client and the document, from a local workstation...
US20090099967 HEALTH CARE SYSTEM, KEY MANAGEMENT SERVER AND METHOD FOR MANAGING KEY, AND ENCRYPTING DEVICE AND METHOD FOR ENCRYPTING VITAL SIGN DATA  
Provided is a health care system including a key management server that receives from a server a request for a decryption key, with first identification information identifying a measuring...
US20090154709 MIGRATION OF COMPUTER SECRETS  
Described is a technology by which computer data secrets sealed by a trusted platform module (TPM) or like device may be securely migrated from a physical source computing machine to a physically...
US20090037728 Authentication System, CE Device, Mobile Terminal, Key Certificate Issuing Station, And Key Certificate Acquisition Method  
Provided is an authentication system for improving user-friendliness. An IC card (100) of the authentication system (10) includes: a key/certificate storage unit (120) connected to a terminal...
US20110103589 KEY DISTRIBUTING METHOD, PUBLIC KEY OF KEY DISTRIBUTION CENTRE ONLINE UPDATING METHOD AND DEVICE  
A key distributing method, a public key of key distribution centre online updating method, a key distribution centre, a communication entity and a key management system. The system includes:...
US20100067702 KEY GENERATION DEVICE, ENCRYPTION DEVICE, RECEPTION DEVICE, KEY GENERATION METHOD, KEY PROCESSING METHOD, AND PROGRAM  
A key generation device according to the present invention hierarchically constructs a Y-ary tree structure where n reception devices are assigned to leaves, and forms subgroups where individual...
US20110211700 DEVICE AND METHOD FOR SECURITY KEY EXCHANGE AND SYSTEM PERTAINING TO SAME  
The present invention relates to a device and method that enable a security key to be shared using security key exchange between two terminals, and a system that supports the same. To achieve the...
US20120300940 DYNAMIC KEY MANAGEMENT  
Apparatus, systems, and methods may operate to receive a public key associated with a public/private key pair at a key distribution handler, after a new workload and an associated key agent are...
US20050144634 Method for providing pay-TV service based on session key  
Disclosed is a method for providing a pay-TV service based on a session key. The method includes the steps of: selecting a desired pay event using a program guide displayed on a system of the...
US20110158412 INFORMATION DISCLOSURE APPARATUS  
An information tray creation apparatus generates a pair of an encryption key and a decoding key, encrypts disclosure information using the encryption key, and generates encrypted disclosure...
US20120079279 Generation of SW Encryption Key During Silicon Manufacturing Process  
A method of generating an encryption key during the manufacturing process of a device includes randomly generating a seed, encrypting a unique identifier disposed in the device to obtain a first...
US20110029773 Optical Network Terminal Management Control Interface-Based Passive Optical Network Security Enhancement  
A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical...
US20090150978 ACCESS CONTROL OF CONTENT SYNDICATION  
A content syndication access control solution is provided. An illustrative content syndication access control system comprises: a syndication subscriber for acquiring a authorized content...
US20080292105 LIGHTWEIGHT KEY DISTRIBUTION AND MANAGEMENT METHOD FOR SENSOR NETWORKS  
A lightweight security framework is disclosed that combines PKI with symmetric key cryptography to exploit the system asymmetry in hierarchical sensor networks. The framework provides protocols...
US20150003615 KEY AGREEMENT PROTOCOL  
The present invention relates to data communication systems and protocols utilized in such systems.
US20090276630 Group Signature System And Information Processing Method  
In a group signature system of the present invention, user device 400 registered in the group, when receiving an issuing device public key of a set that includes order N of a cyclic group and its...
US20090232315 UNIFIED AND PERSISTENT SYSTEM AND METHOD FOR AUTOMATIC CONFIGURATION OF ENCRYPTION  
A system and method for database security provides, a database security method that receives an encryption property from an application and receives information relating to a database server. The...
US20090187760 Security Mechanism within a Local Area Network  
A local area network server may issue security certificates to client devices on the network for two-way authentication across the network. The certificates may be issued through a transaction...
US20080118070 Open and distributed systems to provide secure email service  
A system to ease secure email communication by providing a unique email address of a user's choice, along with a private and public key pair which are generated and then associated with the email...
US20120288096 SECURITY KEY DISTRIBUTION IN A CLUSTER  
Provided are techniques for the fast and reliable distribution of security keys within a cluster of computing devices, or computers. One embodiment provides a method for secure distribution of...
US20050091681 Systems and methods for video storage and display  
Systems and methods for cost effectively making video content available to users are disclosed. In particular, a prescient abundant viewer (PAW) is described. A PAW includes a content receiver, a...
US20120257758 STRENGTHENED PUBLIC KEY PROTOCOL  
A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private...
US20100023757 METHODS AND SYSTEMS FOR SENDING SECURE ELECTRONIC DATA  
A method and system for providing encryption are provided, involving a) transmitting a request from a sender to a database for a public key for a selected recipient, the database being configured...
US20090086980 ENABLING A SECURE OEM PLATFORM FEATURE IN A COMPUTING ENVIRONMENT  
A platform feature licensing module (e.g., a USB Smart Card Token) securely stores and communicates a platform feature enabling license, corresponding to a selectable platform feature, to an...

Matches 1 - 50 out of 131 1 2 3 >