Matches 1 - 50 out of 362 1 2 3 4 5 6 7 8 >


Match Document Document Title
US20160234683 METHODS AND SYSTEMS FOR OPERATING A SECURE MOBILE DEVICE  
Method and apparatus for communicating with a machine to machine, M2M, device comprising: deriving at a M2M device using generic bootstrapping architecture, GBA, a first key. Sending a second key...
US20160234183 COMMUNICATING WITH A MACHINE TO MACHINE DEVICE  
The present disclosure provides methods and apparatus for administering an interface between a machine-to-machine, M2M, device and a network application function, NAF, for secure communication...
US20150033021 REMOTE ACCESS TO LOCAL NETWORK VIA SECURITY GATEWAY  
Multiple protocol tunnels (e.g., IPsec tunnels) are deployed to enable an access terminal that is connected to a network to access a local network associated with a femto access point. A first...
US20140310516 SYSTEMS AND METHODS FOR SECURING DATA IN MOTION  
Two approaches are provided for distributing trust among certificate authorities. Each approach may be used to secure data in motion. One approach provides methods and systems in which a secure...
US20140189358 MULTIMEDIA DATA PROTECTION  
A method of transmitting a media work such as a movie to a client is disclosed. The method includes (a) encrypting the work using a sequence of different keys corresponding to respective...
US20160378689 SYSTEMS AND METHODS FOR SECURE MULTI-TENANT DATA STORAGE  
Systems and methods are provided for transmitting data for secure storage. For each of two or more data sets, a plurality of shares are generated containing a distribution of data from an...
US20160248741 INFORMATION PROCESSING APPARATUS AND METHOD, RECORDING MEDIUM AND PROGRAM  
The present invention relates to an information processing apparatus allowing proper communication with a communication partner in accordance with a communication time of the communication partner.
US20150143126 METHOD AND APPARATUS FOR ESTABLISHING A SECURITY ASSOCIATION  
A method for establishing a security association between a client and a service node for the purpose of pushing information from the service node to the client, where the client and a key server...
US20100058052 METHODS, SYSTEMS AND DEVICES FOR SECURING SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) COMMUNICATIONS  
A secure supervisory control and data acquisition (SCADA) system includes a SCADA control host system and any number of remote terminal unit (RTU) systems. Each RTU system includes an RTU...
US20090249071 MANAGING CODE ENTITLEMENTS FOR SOFTWARE DEVELOPERS IN SECURE OPERATING ENVIRONMENTS  
Systems and methods for managing access to restricted data and system resources in secure operating environments are disclosed. Developer access profiles are issued by trusted authorities to...
US20050149732 Use of static Diffie-Hellman key with IPSec for authentication  
Embodiments of the invention authenticate devices and establish secure connections between devices using static Diffie-Hellman key pairs. A first device obtains in a trusted manner a static DH...
US20090138713 PROXY USE WITHIN A MESH NETWORK  
A method and system facilitate communications between an unassociated device and a server via a mesh network and a wide area network. The method may include receiving transmissions from candidate...
US20090125719 METHODS OF ENSURING LEGITIMATE PAY-PER-CLICK ADVERTISING  
A method for transferring state information between a client device and a server, the client device being configured to select content, and the server having a memory module and being configured...
US20160127903 METHODS AND SYSTEMS FOR AUTHENTICATION INTEROPERABILITY  
Systems, methods, and computer readable mediums for authenticating a device are disclosed. In some aspects, a method includes determining, using a second device, a key shared with the first...
US20160056956 SYSTEMS AND METHODS FOR SECURE WORKGROUP MANAGEMENT AND COMMUNICATION  
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser may split or share a data set into multiple...
US20150319146 System and Method for Security Key Transmission With Strong Pairing to Destination Client  
Systems and methods for security key transmission with strong pairing to a destination client are disclosed. A security key may be generated by an on-chip key generator, an off-chip device, and/or...
US20050036675 Digital communication of captured three-dimensional object over a network  
The three-dimensional imaging system providing distribution over a distributed network. A low-cost convenient three-dimensional imaging system having a digitizer and orientation fixture which...
US20140281545 MULTI-LAYER EMBEDDED ENCRYPTION  
A method for automatically encrypting files is disclosed. In some cases, the method may be performed by computer hardware comprising one or more processors. The method can include detecting access...
US20120166804 VLAN Tunneling  
According to one embodiment of the invention, a method is described that is directed to sending, by a network device, information over a first tunnel associated with a first virtual local area...
US20110126014 Event Triggered Pairing of Wireless Communication Devices Based on Time Measurements  
An event-triggered pairing mechanism allows pairing wireless devices having short range interfaces (e.g., Bluetooth devices) by bumping the wireless devices together. A wireless device being...
US20120166803 VERIFICATION METHOD, APPARATUS, AND SYSTEM FOR RESOURCE ACCESS CONTROL  
A verification method includes obtaining a Uniform Resource Locator (URL) link from a user terminal. The URL link is generated by a portal server according to obtained user terminal information...
US20120137132 SHARED SECRET ESTABLISHMENT AND DISTRIBUTION  
Providing secure communication with a security token includes establishing a shared secret between the security token and a first entity, transferring the shared secret between the first entity...
US20090282251 AUTHENTICATING A WIRELESS DEVICE IN A VISITED NETWORK  
Alternative authentication approaches for service request are provided. For a mobile station roaming in a visited network that does not support conventional updating of cryptographic keys (such as...
US20070143613 Prioritized network access for wireless access networks  
The present invention relates to a method, terminal device, network element, authentication server, and computer-readable medium for controlling prioritized access to a wireless access network. An...
US20160294795 MULTIMEDIA NETWORK SYSTEM WITH CONTENT IMPORTATION, CONTENT EXPORTATION, AND INTEGRATED CONTENT MANAGEMENT  
This system provides wired and/or wireless access throughout a multimedia network built on a distributed architecture which can be transparent to the user. This multimedia network includes content...
US20160191544 USER TERMINAL, SERVICE PROVIDING APPARATUS, DRIVING METHOD OF USER TERMINAL, DRIVING METHOD OF SERVICE PROVIDING APPARATUS, AND ENCRYPTION INDEXING-BASED SEARCH SYSTEM  
A user terminal, a service providing apparatus, a driving method of a user terminal, a driving method of a service providing apparatus, and an encryption indexing-based search system are provided....
US20150245204 DEVICE AUTHENTICATION  
A method for authenticating a first device capable of operating according to a wireless communications protocol, the method comprising: at a second device, receiving a first message comprising an...
US20090164786 CONTENT DELIVERY METHOD, CONTROL TERMINAL, AND DISPLAY TERMINAL  
A content delivery method, a control terminal for content delivery, and a display terminal for receiving content delivery. In a content delivery service, the control terminal for authentication...
US20070136592 Wireless internet gateway  
A wireless Internet gateway which bridges the gap between the Internet and wireless devices, e.g., via a short message service center (SMSC). The disclosed wireless Internet gateway provides a...
US20050120213 System and method for provisioning and authenticating via a network  
System architecture and corresponding method for securing communication via a network (e.g. IEEE 802.11) is provided. In accordance with one embodiment, the present system and method protocol, may...
US20160149873 ELECTRONIC COMMERCE WITH CRYPTOGRAPHIC AUTHENTICATION  
A method for facilitating an authentication related to an electronic transaction between a first and a second user is provided. Authentication data is received from the first user along with...
US20140304513 STORAGE DRIVE PROCESSING MULTIPLE COMMANDS FROM MULTIPLE SERVERS  
One embodiment of the invention relates to a key/value storage device. The key/value storage device includes a storage medium for storing data, a network interface for receiving commands sent by...
US20070277036 Intelligent data storage and processing using fpga devices  
A data storage and retrieval device and method is disclosed. The device includes at least one magnetic storage medium configured to store target data and at least one re-configurable logic device...
US20140365777 SYSTEMS AND METHODS FOR SECURING NETWORK COMMUNICATIONS  
Secure communications may be established amongst network entities for performing authentication and/or verification of the network entities. For example, a user equipment (UE) may establish a...
US20100250939 SYSTEM AND METHOD OF HANDLING ENCRYPTED BACKUP DATA  
By using a symmetric key to encrypt mobile device data before transmitting the data to a backup location in a backup operation, access to the data, at the backup location, may be restricted. To...
US20100153709 Trust Establishment From Forward Link Only To Non-Forward Link Only Devices  
In the present system three methods are provided for establishing trust between an accessory device and a host device, without placing trust in the device/host owner, so that content protection...
US20070204161 Transmitter, receiver, and transmitting method  
According to one embodiment, a transmitting method transmits a start request for an authentication and key exchange from at least one of receivers to the transmitter, performs an authentication...
US20150358312 SYSTEMS AND METHODS FOR HIGH AVAILABILITY OF HARDWARE SECURITY MODULES FOR CLOUD-BASED WEB SERVICES  
A new approach is proposed to support high availability (HA) of hardware security module (HSM) adapters in an HSM HA domain for web services hosted in a cloud to offload their key storage,...
US20150033016 SYSTEMS AND METHODS FOR SECURING REAL-TIME MESSAGES  
A first aspect of the invention includes a method of securing messages using multiple cryptographic algorithms that distributes the burden of computing a session key using a strong cryptographic...
US20120226909 Method of Configuring a Node, Related Node and Configuration Server  
A method for configuring a node, said node holding a public key depending on an identifier relating to said node, a related secret key and an address of a configuration server storing sets of...
US20090094458 PROCESS AND SYSTEM FOR CONFIRMING TRANSACTIONS BY MEANS OF MOBILE UNITS  
Process for confirming transactions by means of mobile units (MU), wherein a control device (CD) sends a request message (RM) containing transaction data (TD) to a mobile unit (MU), which can send...
US20070074024 Multiple code service system and method thereof  
A multiple code service system and method thereof are provided. A tag includes first identification information, and a terminal identifies the first identification information of the tag. A...
US20170039352 ROOT OF TRUST  
First transistor logic is arranged by a first logic provider in circuit form and provides a minimum of functionality of the semiconductor device employed to bring up the semiconductor device,...
US20120260094 DIGITAL RIGHTS MANAGMENET USING ATTRIBUTE-BASED ENCRYPTION  
A data provider (1) for use in a digital rights management system comprises a data protector (2) for protecting data (20), using attribute-based encryption, in dependence on an access policy over...
US20120011360 KEY MANAGEMENT SYSTEMS AND METHODS FOR SHARED SECRET CIPHERS  
Various embodiments are described herein for a Key Management System (KMS) and associated methods for providing authentication and secure shared key distribution capabilities without revealing a...
US20110145581 MEDIA PLAYBACK ACROSS DEVICES  
A method may include displaying media items via a network, wherein the network includes a mobile device, a personal computer, and a set-top box connected to a television. A first communication...
US20160119291 SECURE COMMUNICATION CHANNEL WITH TOKEN RENEWAL MECHANISM  
One embodiment of the present invention includes a server machine configured to establish a secure communication channel with a client machine via renewable tokens. The server machine receives a...
US20140101452 METHOD AND TERMINAL FOR TRANSMITTING INFORMATION  
The present disclosure provides an information transmitting method and terminal for the same. The method can comprise: establishing a communication connection between an execution terminal and a...
US20080222416 Secure Network Connection  
Implementations described and claimed herein provide a secure network connection for remote access, e.g., to building automation systems. A secure network connection may be established according...
US20070248232 CRYPTOGRAPHIC KEY SHARING METHOD  
A system for sharing secure keying information with a new device not of a secure wireless network. The keying information may be used for encryption and provided to the new device in a manner...

Matches 1 - 50 out of 362 1 2 3 4 5 6 7 8 >