Match
|
Document |
Document Title |
|
US20090063694 |
Multimedia Access Device, Multimedia Playing System Comprising the Multimedia Access Device, and Multimedia Data Playing Method
A multimedia access device, a multimedia playing system comprising the multimedia access device, and a multimedia data playing method are provided. The multimedia playing system comprises a portal... |
|
US20060165232 |
Method and apparatus to encrypt video data streams
A method and system for encrypting a video data stream, the video data stream partitioned into units based upon a type of data contained within the units. The method comprising: determining for... |
|
US20070253548 |
Data protection system, method, and program
The data dividing unit divides data into n pieces. An encoding unit generates m pieces of encoded data composed of a set of a bitmap matrix specifying a plurality pieces of divided data for... |
|
US20060291650 |
State-varying hybrid stream cipher
In one embodiment, a state-varying hybrid stream cipher operating within a computing device. The state-varying hybrid stream cipher comprises at least two software routines. A first routine is... |
|
US20060133610 |
Method and system for a secure high bandwidth bus in a transceiver device
A transceiver system for receiving content contained in a secure digital broadcast signal including a first component for generating a data stream from a received digital broadcast signal coupled... |
|
US20060204115 |
Video encoding
The invention relates to a video encoding apparatus (100) comprising a video analysis processor (101) and a video encoder (103). The video analysis processor (101) comprises a segmentation... |
|
US20060126831 |
Systems, methods, and media for adding an additional level of indirection to title key encryption
Systems, methods and media for encrypting and decrypting content files are disclosed. More particularly, hardware and/or software for adding an additional level of indirection to a title key... |
|
US20060053308 |
Secured redundant memory subsystem
A storage device consists of multiple solid state memory devices and a memory controller. The memory devices are configured as a redundant array, such as a RAID memory array. The memory controller... |
|
US20050201556 |
Trick play of encrypted data in a conditional access signal
An incoming data stream contains a stream of encrypted data and a stream of messages. Data in successive segments of the stream of encrypted data is decryptable with successive decryption... |
|
US20050025312 |
Distribution of encrypted information
A secure device capable of selectively enabling decryption of units of information is used to provide access to a stream of units of encrypted information. Each unit is linked to a time-stamp. An... |
|
US20100067687 |
METHOD AND APPARATUS FOR MAINTAINING DATA INTEGRITY FOR BLOCK-ENCRYPTION ALGORITHMS
A method is disclosed for modifying an iterated block cipher by controlling the operations and transformations that cause diffusion. In one embodiment which is applicable to any iterated block... |
|
US20060039555 |
Method and system for performing permutations using permutation instructions based on butterfly networks
The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other... |
|
US20070110225 |
Method and apparatus for efficient encryption
Methods and apparatuses are provided for accelerating the throughput and or reducing the power consumption of symmetric cryptography algorithms. Certain computations of a symmetric encryption or... |
|
US20060072746 |
Register scheduling in iterative block encryption to reduce memory operations
Systems and methods encrypt data according to a multi-round, block encryption algorithm, In some embodiments, each round includes transforming data held in a group of registers of a processor... |
|
US20100111298 |
BLOCK CIPHER DECRYPTION APPARATUS AND METHOD
An apparatus and method obtains cipher block chaining mode (CBC) ciphertext blocks that were encrypted using a cipher block chaining encryption method, such a audio or video, and decrypts the CBC... |
|
US20070140496 |
Escrow compatible key generation
A method of managing encryption keys creates a new encryption key as a predictable and retrospectively repeatable function of a current encryption key. Information is then encrypted or... |
|
US20050021990 |
Method for making secure a secret quantity
The invention concerns a method and a system for making secure a secret quantity, contained in an electronic device, and used at least partly in an encryption algorithm of at least part of an... |
|
US20070104325 |
Apparatus and method of detecting steganography in digital data
Disclosed is a method of detecting stego data by determining whether a secret message is hidden in digital data. A method of detecting according to the invention includes extracting at least one... |
|
US20060098818 |
Encryption technique for asynchronous control commands and data
A method of transmitting information from a primary storage control unit to a secondary storage control unit in an asynchronous data copying system. The method includes building multiple... |
|
US20060233361 |
Device, method, and program for encrypton and decryption and recording medium
A part of data is extracted as an IV from cipher text at the previous time. An EX-OR gate ORes the IV and a common key and outputs a cipher key. Data to be transmitted are encrypted with the... |
|
US20060159263 |
Scrambled state display method of broadcasting signal
A scrambled state display method of a broadcasting signal is disclosed whereby discrimination is made as to whether cable TV broadcasting signal is a scrambled A/V stream and it is displayed on a... |
|
US20070098155 |
Data processing device and data processing method
Input data is stored in input buffers provided for respective input channels. An operation channel control section controls an input data selector to allow the data stored in the input buffers to... |
|
US20070147604 |
Integrated circuit having advanced encryption standard core and wrapper for validating advanced encryption standard core
Disclosed is an integrated circuit having an encryption core. The integrated circuit includes an encoder configured to encrypt an input plaintext using a first cipher key to produce a ciphertext,... |
|
US20050008151 |
Processor device and method for data protection by means of data block scrambling
A processor device and method for data protection by means of data block scrambling is disclosed, which has a processor core, a cache and a block scrambling/de-scrambling device. The processor... |
|
US20060050871 |
Method and apparatus for securing data stored within a non-volatile memory
A method for securing data of a non-volatile memory device, comprising: providing the non-volatile memory device with a secured chip, for securely storing a secret for ciphering/deciphering the... |
|
US20070106907 |
Method and device for encryption and decryption on the fly
A method for protecting a datum, wherein the datum is encrypted and, prior to sending the datum to a recipient, the datum is divided into at least a first block and a second block. The method... |
|
US20060177054 |
Data processing apparatus, data recording apparatus, data playback apparatus, and data storage method
Upon encrypting and storing data C on a recording medium, data B corresponding to data C is embedded in a padding area together with parity data for data B and C as padding data, and data B and... |
|
US20050147244 |
Method for cryptographic transformation of binary data blocks
A method for cryptographic transformation of a binary data block comprising the steps splitting said data block into N≧2 sub-blocks, alternately converting said sub-blocks by the operations... |
|
US20100158243 |
METHOD OF ENCRYPTION IN NETWORKED EMBEDDED SYSTEMS
A data encryption method includes providing a sender node having information to transmit. The information is divided into a sequence of frames. A respective one of a plurality of frame numbers is... |
|
US20100158244 |
COMMUNICATION ENCRYPTION METHOD FOR SUPPORTING REMOTE MONITORING AND CONTROL SYSTEM
A communication encryption method for supporting a remote monitoring and control system includes establishing a communication network between a server and a remote host, encrypting a data to be... |
|
US20060269055 |
Method and apparatus for improving performance and security of DES-CBC encryption algorithm
Method and apparatus for transforming data in a data processing system. A first portion of a block of data is transformed using a first key having a first number of bits, and a second portion of... |
|
US20050047592 |
Single-round enciphering apparatus and method using a reduced number of elements in a mobile communication system
An enciphering apparatus and method divide an input bit stream with length 2n into first and second sub-bit streams with length n, perform an enciphering procedure, and output an enciphered bit... |
|
US20070092076 |
Initialization method and termination method for scrambling transport stream
The present invention provides a system, method and apparatus for encrypting/decrypting plain data/cipher text having lengths not equal to a multiple of a data chunk of a block cipher algorithm.... |
|
US20110091035 |
HARDWARE KASUMI CYPHER WITH HYBRID SOFTWARE INTERFACE
A system including a memory; a software interface, operatively connected to the memory, and configured to generate a modified version of a confidentially key (CKey), and a modified version of an... |
|
US20070098156 |
Digital rights management
A method for allocating to a device a license to use digital content, the method comprising the steps of: receiving a first block of ciphertext from the device; decrypting the first block of... |
|
US20050141705 |
Verification method of mobile communication system
A security verification method of a mobile communication system is provided. The method includes: (1) a first key and a second key are generated and stored in a first processor and a second... |
|
US20070230690 |
System for write failure recovery
When cipher block chaining encryption/decryption is employed, write fault recovery is accomplished by storing information useful for the writing of cipher block chaining processed data before it... |