Matches 1 - 50 out of 94 1 2 >


Match Document Document Title
US20110200194 AMBULATORY REPEATER FOR USE IN AUTOMATED PATIENT CARE  
An ambulatory repeater for use in automated patient care is presented. A local memory store includes a cryptographic key, sensitive information, and physiological measures. The cryptographic key...
US20120224696 Interoperable Digital Rights Management  
The subject matter disclosed herein relates to a method and/or system for enabling access to media content using different digital rights management formats.
US20110116637 METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR AUTOMATICALLY VERIFYING AND POPULATING DIGITAL CERTIFICATES IN AN ENCRYPTION KEYSTORE  
Methods for automatically verifying and populating an encryption keystore are provided. Pursuant to these methods, the keystore may be automatically checked to determine if it is missing a...
US20090154711 MULTI-PARTY KEY AGREEMENT METHOD USING BILINEAR MAP AND SYSTEM THEREFOR  
The present invention provides an efficient method and system in which a plurality of participants share a secret key in a communication environment that is not ensured. According to an embodiment...
US20130159699 Password Recovery Service  
According to aspects of the present invention there are provided methods and apparatus for enabling a user to secure and back-up an encryption key for use by a client device in encrypting and...
US20110293098 KEY RECOVERY MECHANISM  
A method and system for key recovery for a private key of a digital certificate for a client.
US20110072264 Secure information storage and retrieval apparatus and method  
A user using a client computer registers with a server computer over a computer network by submitting a biometric scan of a body part of the user. The user commands the client computer to encrypt...
US20060291664 Automated key management system  
A system for automated cryptographic key management comprises a key control system, a key management agent system, and a key system application program interface. A method for automated...
US20080063210 REKEYING ENCRYPTION FOR REMOVABLE STORAGE MEDIA  
Provided are a method, system, and article of manufacture for rekeying encryption keys for removable storage media. A rekey request is received for a coupled removable storage media, wherein...
US20120170753 MANAGEMENT OF SSL CERTIFICATE ESCROW  
Methods and systems for providing a secure SSL certificate escrow service comprise: providing a secure upload webpage for a private key holder to upload an encrypted copy of a private key;...
US20070174613 Context limited shared secret  
In a communication system in which two communication entities seek to have a private or confidential communication session, a trust relationship needs first be established. The trust relationship...
US20050232430 Security countermeasures for power analysis attacks  
A countermeasure for differential power analysis attacks on computing devices. The countermeasure includes the definition of a set of split mask values. The split mask values are applied to a key...
US20090080662 Key Recovery in Encrypting Storage Devices  
A method for recovering a password includes: obtaining a request code from a data storage device, transmitting the request code to an external authority that produces a recovery code from the...
US20140247944 CRYPTOGRAPHIC DEVICE WITH RESISTANCE TO DIFFERENTIAL POWER ANALYSIS AND OTHER EXTERNAL MONITORING ATTACKS  
Techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret...
US20070003066 Secure instant messaging  
Secure instant messaging is described. In an embodiment, a messaging device encrypts a challenge identifier to generate an encrypted challenge message, and communicates the encrypted challenge...
US20120257759 ONE-TIME RECOVERY CREDENTIALS FOR ENCRYPTED DATA ACCESS  
A key recovery request for a device is received at a key recovery service and a particular one-time recovery credential in a sequence of multiple one-time recovery credentials is identified. In...
US20070172069 Domain management method and apparatus  
A method and apparatus of protecting digital content within a domain is provided. if a device registered with a domain withdraws from the domain, a domain key used in the domain before withdrawal...
US20070064952 Internet facsimile relay apparatus and method, and storage medium  
An Internet facsimile relay unit includes an e-mail receiving section that receives an e-mail including an image and a command to transmit the image as a facsimile to a terminal station, a...
US20060182283 Architecture for asymmetric crypto-key storage  
Techniques for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions are provided. A first one of multiple factors is stored. All of the...
US20070140483 Combination-based broadcast encryption method  
A combination-based broadcast encryption method includes: assigning by a server a base group of different combinations to each user; producing and sending secret information for each user by using...
US20090097662 PROCESSING ENCRYPTED ELECTRONIC DOCUMENTS  
Electronic document processing logic coupled to a computer and to a quarantine is operable to identify an encrypted electronic document received at the computer; determine whether the key server...
US20090327702 Key Escrow Service  
A key escrow service is described. In embodiment(s), the key escrow service maintains an escrow license that includes an escrow content key that is associated with protected media content which is...
US20080019530 MESSAGE ARCHIVAL ASSURANCE FOR ENCRYPTED COMMUNICATIONS  
Embodiments of the present invention address deficiencies of the art in respect to encrypted message management in an archival environment, and provide a novel and non-obvious method, system and...
US20090003609 Method for Updating Encryption Keystores Within a Data Processing System  
A method for updating encryption keystores within a computer network having multiple host computers is disclosed. A keystore is initially loaded into a key manager within one of the host...
US20070297615 Computing Device with a Process-Based Keystore and method for Operating a Computing Device  
A computing device is provided with a key manager which provides a mechanism for distinguishing between authorised use and unauthorized use of a cryptographic key by identifying an owning...
US20110261964 REDUNDANT KEY SERVER ENCRYPTION ENVIRONMENT  
Provided are a computer program product, system and method for a redundant key server encryption environment. A key server transmits public keys associated with the key server and at least one...
US20080130902 SECURE WIRELESS INSTRUMENTATION NETWORK SYSTEM  
The present system having a secure wireless infrastructure with a key server acting as a key distribution center. The key server may be the core of the network, securely admitting new nodes or...
US20090080664 METHOD OF STORING BROADCAST CONTENTS IN MOBILE BROADCAST SERVICE TERMINAL  
Disclosed is a method of recording and storing a broadcast content received for mobile broadcast services in a transmitting-end level. A broadcast receiving terminal includes a type of the key...
US20060083379 Cryptographic communications session security  
A method of cryptographically securing communications includes converting the communications to quantum states, observing the quantum states, and confirming that the observed states equate to the...
US20100142713 NEARLY-STATELESS KEY ESCROW SERVICE  
Some embodiments provide a system to generate a key pair. During operation, the system can receive a request to generate the key pair, wherein the key pair is generated by a key assigner, and...
US20080219453 MAINTAINING KEYS REMOVED FROM A KEYSTORE IN AN INACTIVE KEY REPOSITORY  
Provided are a method, system, and article of manufacture for maintaining keys removed from a keystore in an inactive key repository. A keystore includes active keys, wherein at least one active...
US20050228994 Method for encryption backup and method for decryption restoration  
A backup method which encrypts user data with an encryption/decryption key generated in an authenticated device; generates a reissue data processing key from a password and a device key in the...
US20070147621 Cryptoanalysis method and system  
A cryptanalysis method comprising: (A)Perfonning a ciphertext-only direct cryptanalysis of A5/1 and (B) Using results of Step (A) to facilitate the decryption and/or encryption of further...
US20100027798 METHOD AND APPARATUS FOR STORAGE OF SECURE INFORMATION, WHICH IS REQUIRED FOR SHORT-RANGE COMMUNICATION, ON A COMMUNICATION TERMINAL  
A method of storing secure information that is required for a near-field communication on a communication terminal includes transmitting a request to store information and a key required for...
US20050157881 Cryptographic security module method and apparatus  
A cryptographic security module holds a cryptographic key having a private part and a public part. The private part is held within the module and is usable only to sign messages generated within...
US20050254658 System and method for generating reproducible session keys  
A system and method for generating reproducible session keys in a wireless messaging system. The session key is generated based on a hash of a message itself, optionally concatenated with...
US20070280483 Methods and systems for key recovery for a token  
Methods, systems and computer readable mediums are provided for recovering keys. A key transport session key is generated, and a key encryption key is derived based on a server master key and an...
US20090323948 Stream Generation Method, Broadcast Receiving Apparatus, and Display Method  
Provided is a system far receiving a initialization packet containing an initial vector for initializing stream encryption algorithm and an identifier of a key for decrypting an encrypted stream,...
US20070195960 Apparatus and method for encrypting data  
A method for sharing a data set including multiple classifications of security between one or more entities and/or between one or more organizations. Public-keys for use in selectively encrypting...
US20050129247 Device and method for generating random numbers using a pseudo random number generator  
Device for generating random numbers having a pseudo random number generator, a memory and a sequential controller. The pseudo random number generator generates a deterministic random number...
US20070014416 System and method for protecting against dictionary attacks on password-protected TPM keys  
A computer system that may include a trusted platform module (TPM) along with a processor hashes a user-supplied password for a predetermined time period that is selected to render infeasible a...
US20080152151 HIGHLY AVAILABLE CRYPTOGRAPHIC KEY STORAGE (HACKS)  
A system and method for managing trusted platform module (TPM) keys utilized in a cluster of computing nodes. A cluster-level management unit communicates with a local TPM agent in each node in...
US20060050889 Decrypting block encrypted data  
Decrypting block encrypted data includes: parsing encrypted input data and dividing the parsed data into a ciphertext and a first plaintext defining a decryption policy to be applied to the...
US20070206799 Efficient key hierarchy for delivery of multimedia content  
A Digital Rights Management (DRM) system provides a lightweight layering of encryption and decryption of keys that allows efficient use of different cryptographic techniques to effect the secure...
US20090154710 Method for the Secure Deposition of Digital Data, Associated Method for Recovering Digital Data, Associated Devices for Implementing Methods, and System Comprising Said Devices  
The invention relates to a method for the secure deposition of data, according to which a depositor encrypts the data with a transfer key and encrypts the transfer key with a key of a third party,...
US20070223706 CERTIFY AND SPLIT SYSTEM AND METHOD FOR REPLACING CRYPTOGRAPHIC KEYS  
A feature is provided that facilitates securely creating, and/or replacing cryptographic keys. A first key pair is created comprising first private key and first public key. A second (spare) key...
US20090182668 METHOD AND APPARATUS TO ENABLE LAWFUL INTERCEPT OF ENCRYPTED TRAFFIC  
Methods and systems are described for communicating the session keys used to encrypt media stream to allow a lawful intercept agency to decrypt the media stream. Assuming the endpoints negotiate...
US20080031460 Technique for split knowledge backup and recovery of a cryptographic key  
In a secure cryptographic environment, a private key in a private/public key cryptographic scheme needs to be backed up and recovered in case of a loss or corruption of the private key. To back up...
US20090028343 Method and Apparatus for Providing an Asymmetric Encrypted Cookie for Product Data Storage  
A process may be utilized by a device to implement public key asymmetric encryption. The process encrypts a data set with a symmetric encryption key to form an encrypted data set. Further, the...
US20070165865 Method and system for encryption and storage of information  
The invention relates to a method and system for data encryption implemented in conjunction with data transmission over a communications network. According to the invention, an electronic message...

Matches 1 - 50 out of 94 1 2 >