Matches 1 - 37 out of 37


Match Document Document Title
US20090063694 Multimedia Access Device, Multimedia Playing System Comprising the Multimedia Access Device, and Multimedia Data Playing Method  
A multimedia access device, a multimedia playing system comprising the multimedia access device, and a multimedia data playing method are provided. The multimedia playing system comprises a portal...
US20060165232 Method and apparatus to encrypt video data streams  
A method and system for encrypting a video data stream, the video data stream partitioned into units based upon a type of data contained within the units. The method comprising: determining for...
US20070253548 Data protection system, method, and program  
The data dividing unit divides data into n pieces. An encoding unit generates m pieces of encoded data composed of a set of a bitmap matrix specifying a plurality pieces of divided data for...
US20060291650 State-varying hybrid stream cipher  
In one embodiment, a state-varying hybrid stream cipher operating within a computing device. The state-varying hybrid stream cipher comprises at least two software routines. A first routine is...
US20060133610 Method and system for a secure high bandwidth bus in a transceiver device  
A transceiver system for receiving content contained in a secure digital broadcast signal including a first component for generating a data stream from a received digital broadcast signal coupled...
US20060204115 Video encoding  
The invention relates to a video encoding apparatus (100) comprising a video analysis processor (101) and a video encoder (103). The video analysis processor (101) comprises a segmentation...
US20060126831 Systems, methods, and media for adding an additional level of indirection to title key encryption  
Systems, methods and media for encrypting and decrypting content files are disclosed. More particularly, hardware and/or software for adding an additional level of indirection to a title key...
US20060053308 Secured redundant memory subsystem  
A storage device consists of multiple solid state memory devices and a memory controller. The memory devices are configured as a redundant array, such as a RAID memory array. The memory controller...
US20050201556 Trick play of encrypted data in a conditional access signal  
An incoming data stream contains a stream of encrypted data and a stream of messages. Data in successive segments of the stream of encrypted data is decryptable with successive decryption...
US20050025312 Distribution of encrypted information  
A secure device capable of selectively enabling decryption of units of information is used to provide access to a stream of units of encrypted information. Each unit is linked to a time-stamp. An...
US20100067687 METHOD AND APPARATUS FOR MAINTAINING DATA INTEGRITY FOR BLOCK-ENCRYPTION ALGORITHMS  
A method is disclosed for modifying an iterated block cipher by controlling the operations and transformations that cause diffusion. In one embodiment which is applicable to any iterated block...
US20060039555 Method and system for performing permutations using permutation instructions based on butterfly networks  
The present invention provides permutation instructions which can be used in software executed in a programmable processor for solving permutation problems in cryptography, multimedia and other...
US20070110225 Method and apparatus for efficient encryption  
Methods and apparatuses are provided for accelerating the throughput and or reducing the power consumption of symmetric cryptography algorithms. Certain computations of a symmetric encryption or...
US20060072746 Register scheduling in iterative block encryption to reduce memory operations  
Systems and methods encrypt data according to a multi-round, block encryption algorithm, In some embodiments, each round includes transforming data held in a group of registers of a processor...
US20100111298 BLOCK CIPHER DECRYPTION APPARATUS AND METHOD  
An apparatus and method obtains cipher block chaining mode (CBC) ciphertext blocks that were encrypted using a cipher block chaining encryption method, such a audio or video, and decrypts the CBC...
US20070140496 Escrow compatible key generation  
A method of managing encryption keys creates a new encryption key as a predictable and retrospectively repeatable function of a current encryption key. Information is then encrypted or...
US20050021990 Method for making secure a secret quantity  
The invention concerns a method and a system for making secure a secret quantity, contained in an electronic device, and used at least partly in an encryption algorithm of at least part of an...
US20070104325 Apparatus and method of detecting steganography in digital data  
Disclosed is a method of detecting stego data by determining whether a secret message is hidden in digital data. A method of detecting according to the invention includes extracting at least one...
US20060098818 Encryption technique for asynchronous control commands and data  
A method of transmitting information from a primary storage control unit to a secondary storage control unit in an asynchronous data copying system. The method includes building multiple...
US20060233361 Device, method, and program for encrypton and decryption and recording medium  
A part of data is extracted as an IV from cipher text at the previous time. An EX-OR gate ORes the IV and a common key and outputs a cipher key. Data to be transmitted are encrypted with the...
US20060159263 Scrambled state display method of broadcasting signal  
A scrambled state display method of a broadcasting signal is disclosed whereby discrimination is made as to whether cable TV broadcasting signal is a scrambled A/V stream and it is displayed on a...
US20070098155 Data processing device and data processing method  
Input data is stored in input buffers provided for respective input channels. An operation channel control section controls an input data selector to allow the data stored in the input buffers to...
US20070147604 Integrated circuit having advanced encryption standard core and wrapper for validating advanced encryption standard core  
Disclosed is an integrated circuit having an encryption core. The integrated circuit includes an encoder configured to encrypt an input plaintext using a first cipher key to produce a ciphertext,...
US20050008151 Processor device and method for data protection by means of data block scrambling  
A processor device and method for data protection by means of data block scrambling is disclosed, which has a processor core, a cache and a block scrambling/de-scrambling device. The processor...
US20060050871 Method and apparatus for securing data stored within a non-volatile memory  
A method for securing data of a non-volatile memory device, comprising: providing the non-volatile memory device with a secured chip, for securely storing a secret for ciphering/deciphering the...
US20070106907 Method and device for encryption and decryption on the fly  
A method for protecting a datum, wherein the datum is encrypted and, prior to sending the datum to a recipient, the datum is divided into at least a first block and a second block. The method...
US20060177054 Data processing apparatus, data recording apparatus, data playback apparatus, and data storage method  
Upon encrypting and storing data C on a recording medium, data B corresponding to data C is embedded in a padding area together with parity data for data B and C as padding data, and data B and...
US20050147244 Method for cryptographic transformation of binary data blocks  
A method for cryptographic transformation of a binary data block comprising the steps splitting said data block into N≧2 sub-blocks, alternately converting said sub-blocks by the operations...
US20100158243 METHOD OF ENCRYPTION IN NETWORKED EMBEDDED SYSTEMS  
A data encryption method includes providing a sender node having information to transmit. The information is divided into a sequence of frames. A respective one of a plurality of frame numbers is...
US20100158244 COMMUNICATION ENCRYPTION METHOD FOR SUPPORTING REMOTE MONITORING AND CONTROL SYSTEM  
A communication encryption method for supporting a remote monitoring and control system includes establishing a communication network between a server and a remote host, encrypting a data to be...
US20060269055 Method and apparatus for improving performance and security of DES-CBC encryption algorithm  
Method and apparatus for transforming data in a data processing system. A first portion of a block of data is transformed using a first key having a first number of bits, and a second portion of...
US20050047592 Single-round enciphering apparatus and method using a reduced number of elements in a mobile communication system  
An enciphering apparatus and method divide an input bit stream with length 2n into first and second sub-bit streams with length n, perform an enciphering procedure, and output an enciphered bit...
US20070092076 Initialization method and termination method for scrambling transport stream  
The present invention provides a system, method and apparatus for encrypting/decrypting plain data/cipher text having lengths not equal to a multiple of a data chunk of a block cipher algorithm....
US20110091035 HARDWARE KASUMI CYPHER WITH HYBRID SOFTWARE INTERFACE  
A system including a memory; a software interface, operatively connected to the memory, and configured to generate a modified version of a confidentially key (CKey), and a modified version of an...
US20070098156 Digital rights management  
A method for allocating to a device a license to use digital content, the method comprising the steps of: receiving a first block of ciphertext from the device; decrypting the first block of...
US20050141705 Verification method of mobile communication system  
A security verification method of a mobile communication system is provided. The method includes: (1) a first key and a second key are generated and stored in a first processor and a second...
US20070230690 System for write failure recovery  
When cipher block chaining encryption/decryption is employed, write fault recovery is accomplished by storing information useful for the writing of cipher block chaining processed data before it...

Matches 1 - 37 out of 37