Matches 1 - 50 out of 156 1 2 3 4 >

AcclaimIP-ad

Match Document Document Title
US20070036353 Authentication and encryption methods using shared secret randomness in a joint channel  
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two...
US20080310625 DIGITAL SIGNATURE ON A SMARTCARD  
A digital signature scheme for a “smart” card utilizes a set of prestored signing elements and combines pairs of the elements to produce a new session pair. The combination of the elements is...
US20070177726 DIGITAL SIGNATURES ON A SMARTCARD  
A digital signature scheme for a “smart” card utilizes a set of prestored signing elements and combines pairs of the elements to produce a new session pair. The combination of the elements is...
US20100205360 Removable Mother/Daughter Peripheral Card  
A peripheral card having a Personal Computer (“PC”) card form factor and removably coupled externally to a host system is further partitioned into a mother card portion and a daughter card...
US20080005567 METHOD AND SYSTEM FOR PERSONALIZING SMART CARDS USING ASYMMETRIC KEY CRYPTOGRAPHY  
Systems and methods are described that permit a smart card to be personalized in a secure manner using asymmetric cryptography. Systems and methods are described whereby personalization...
US20080219436 METHOD AND APPARATUS FOR PROVIDING A DIGITAL RIGHTS MANAGEMENT ENGINE  
A method receives a set of data. Further, the method receives a traffic key. In addition, the method determines a traffic protection group for the set of data. The method also encrypts the set of...
US20080025514 Systems And Methods For Root Certificate Update  
Certain embodiments of the present invention provide a method for replacing a cryptographic key including receiving a key replacement message for replacing the cryptographic key, decrypting at...
US20060053295 Methods and systems for content detection in a reconfigurable hardware  
Methods and systems consistent with the present invention identify a repeating content in a data stream. A hash function is computed for at least one portion of a plurality of portions of the data...
US20070189520 Systems and Methods to Facilitate Transition from Communication to Commerce  
A method and system to facilitate the conversion from communications to commerce. In one embodiment, a method includes: establishing a communication session between a first user and a second user;...
US20070189519 Detecting compromised ballots  
A facility for discerning corruption of an electronic ballot is described. The facility sends from a first computer system to a second computer system an encrypted ballot that reflects a ballot...
US20070058803 INFORMATION PROCESSING APPARATUS, VERIFICATION PROCESSING APPARATUS, AND CONTROL METHODS THEREOF  
An information processing apparatus comprising, a first generation unit adapted to generate data to be signed by dividing a digital document into regions, a second generation unit adapted to...
US20100189253 PRIVACY-ENHANCED E-PASSPORT AUTHENTICATION PROTOCOL  
A passport authentication protocol provides for encryption of sensitive data such as biometric data and transfer of the encryption key from the passport to the authentication authority to permit...
US20080189032 MAPPING SYSTEM  
An electronic map (1) for use by walkers or cyclist is described. The device is arranged to display on a display screen (3) a high resolution map. The device includes a power management system...
US20100119070 Method and System for Mixed Symmetric and Asymmetric Decryption of .ZIP Files  
The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in...
US20120109419 LOCKABLE COMPARTMENT ACCESS MANAGEMENT  
Apparatus, systems, and methods may operate to receive reservation requests for travel reservations associated with a common carrier. Responsive to receiving a request, an access control code to...
US20110182422 DOCUMENT AUTHENTICATION DATA EMBEDDING METHOD AND APPARATUS  
A method of embedding authentication data in an electronic document image is described. Data related to an item of information on an image of at least one page in the electronic document is...
US20090182668 METHOD AND APPARATUS TO ENABLE LAWFUL INTERCEPT OF ENCRYPTED TRAFFIC  
Methods and systems are described for communicating the session keys used to encrypt media stream to allow a lawful intercept agency to decrypt the media stream. Assuming the endpoints negotiate...
US20080244269 Data processing system, memory device, data processing unit, and data processing method and program  
To provide an improved management structure of memory devices storing service-use applications. A card for a memory device applied to use various services is provided as one child card or more...
US20070269041 Method and apparatus for secure messaging  
Methods and systems for secure messaging are disclosed. One method includes generating a first key associated with the sender. The method further includes encrypting a message from the sender to...
US20060233359 Apparatus, method and system for providing a broadcasting service in a digital broadcasting system with a single frequency network  
An apparatus, method, and system for providing a broadcasting service in a Digital Multimedia Broadcasting (DMB) system with a Single Frequency Network (SFN). Networks of shadow and non-shadow...
US20130121486 IDENTITY-BASED-ENCRYPTION MESSAGE MANAGEMENT SYSTEM  
Systems and methods for managing email are provided. Some of the email may be encrypted using identity-based-encryption (IBE) techniques. When an incoming IBE-encrypted message for a recipient in...
US20090052660 Method For Encrypting And Decrypting Instant Messaging Data  
This invention provides a method for encrypting and decrypting Instant Messaging data. A client encrypts Instant Messaging data using a data encryption key and transmits the data encryption key to...
US20070058815 Method and apparatus for securely transmitting and receiving data in peer-to-peer manner  
A method and apparatus for securely transmitting data between embedded devices are provided. The method includes: issuing a request for a session key that is to be used in a session with the...
US20060126833 Protection of electronic data  
There is disclosed a scheme for secure distribution of content in a manner that users will perceive as fair, while enforcing restrictions on the use of the content in accordance with the...
US20060078109 Information processing apparatus, information processing method, and program  
An information processing apparatus performing cryptographic processing for providing a service by using an integrated circuit chip includes an authentication unit authenticating an operator...
US20150071434 Secure Semiconductor Device Having Features to Prevent Reverse Engineering  
An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the...
US20100077205 System and Method for Cipher E-Mail Protection  
The preferred embodiments of the present invention disclose a security transformation system which includes an e-mail client, a cipher proxy, a dictionary database and an Internet e-mail system....
US20070206786 RFID SECURITY SYSTEM  
A process for handling secret data. In an RFID tag, a cryptography key protecting the secret data is written while with a first holder, a threshold cryptography share is stored, or an arbitrary...
US20080031459 Systems and Methods for Identity-Based Secure Communications  
Methods and systems for securing communications between networked computer agents in a positively identifiable manner, using a centralized arbitration computer agent that acts as a trusted third...
US20060034456 Method and system for performing perfectly secure key exchange and authenticated messaging  
A system and method for the cryptographic exchange of information is provided which affords maximum security, process simplicity and participant convenience to any software application, business...
US20070110233 System and method for providing extensible controls in a communities framework  
A communities framework is disclosed which contains resources in a repository. The repository contains data stored in nodes wherein each node has data associated with a collaboration resource and...
US20170006000 DATA PRIVACY  
In some embodiments, techniques for data security may include encoding and decoding unreadably encoded data, such as data encrypted with a public key or tokenized. In some embodiments, techniques...
US20090285394 ENCRYPTION METHODS FOR SATELLITE RADIO BROADCASTING  
According to the invention, a subscriber to a first satellite radio service can be provided with an option to receive, over their current receiver unit, supplemental content, such as a particular...
US20090103730 APPARATUS AND METHOD FOR USING A DEVICE CONFORMING TO A PAYMENT STANDARD FOR ACCESS CONTROL AND/OR SECURE DATA STORAGE  
Secure establishment of a key associated with a first facility identifier is facilitated. The key is shared between a device and an operator of a first facility, via a public key management...
US20060153370 GENERATING PUBLIC-PRIVATE KEY PAIR BASED ON USER INPUT DATA  
Keys of a public-private key pair are provided by: receiving into a computer system input data from a user (UID); generating within the computer system a first key as a deterministic function of...
US20060126831 Systems, methods, and media for adding an additional level of indirection to title key encryption  
Systems, methods and media for encrypting and decrypting content files are disclosed. More particularly, hardware and/or software for adding an additional level of indirection to a title key...
US20090144557 RECOVERABLE SECURE DATA STORE SYSTEM AND METHOD  
A data security provision system and method are provided herein.
US20080044012 Reducing Security Protocol Overhead In Low Data Rate Applications Over A Wireless Link  
A wireless communication module to provide security at a baseband layer is disclosed. A payload of plaintext may be divided into partitions. The module may use a block cipher such as the Advanced...
US20070237325 Method and apparatus to improve security of cryptographic systems  
A device having cryptographic capabilities is provided as including a security system connected to a microcontroller block, whereby the security system includes a non-volatile memory and a finite...
US20050135609 Gigabit Ethernet passive optical network for securely transferring data through exchange of encryption key and data encryption method using the same  
A Gigabit Ethernet passive optical network (GE-PON) for securely transferring data through exchange of an encryption key comprises an optical line terminal (OLT) for encrypting a secret key using...
US20080253562 Handshake procedure  
The invention discloses a solution for establishing by a handshake procedure a group temporal key for group communication. The group temporal key is established by a group procedure and is a...
US20060153372 Smart card and method protecting secret key  
A smart card and method protecting a secret key, wherein the method may include receiving a ciphertext and a secret key, generating a table, receiving at least one random number chain, executing a...
US20060029224 System and recording medium for securing data and methods thereof  
A system and recording medium for securing data and methods thereof including a modular exponentiation. One embodiment includes first masking a message, second masking an exponent, and executing a...
US20050117745 Data encryption and decryption method using a public key  
A data encryption method using a public key includes encoding data into a first code using a first public key, selecting a predetermined error vector, encoding the selected error vector into a...
US20090268909 METHOD FOR OPERATING A WIRELESS SENSOR NETWORK  
A method for operating a wireless sensor network, wherein the sensor network includes a multitude of distributed sensor nodes for sensing data within a pre-definable environment, and wherein the...
US20080044013 Koblitz Exponentiation with Bucketing  
An implementation of a technology, described herein, for facilitating cryptographic systems and techniques. At least one implementation, described herein, maximizes the speed and security of fast...
US20160269175 CRYPTOGRAPHIC CIPHER WITH FINITE SUBFIELD LOOKUP TABLES FOR USE IN MASKED OPERATIONS  
Various features pertain to cryptographic ciphers such as Advanced Encryption Standard (AES) block ciphers. In some examples described herein, a modified masked AES SubBytes procedure uses a...
US20090214038 SECURITY-ENHANCED RFID SYSTEM  
The present invention relates to RFID systems. In particular, the invention relates to an RFID system having enhanced security of communication between a tag and a tag reader. In a first aspect of...
US20090240941 METHOD AND APPARATUS FOR AUTHENTICATING DEVICE IN MULTI DOMAIN HOME NETWORK ENVIRONMENT  
A device authentication method and device authentication apparatus in a multi domain home network environment are provided. The method includes registering a new device in each local domain and...
US20080170701 Delegation system for decryption rights  
An object of this ciphertext decryption rights delegation system is to enable conversion of PKE-system ciphertext into IBE-system encrypted ciphertext, and, in a delegation system with users using...
Matches 1 - 50 out of 156 1 2 3 4 >