Matches 1 - 50 out of 245 1 2 3 4 5 >

AcclaimIP-ad

Match Document Document Title
US20110296193 CODE-BASED HASHING FOR MESSAGE AUTHENTICATION CODES  
Code-based hashing for message authentication code generation is described. In one aspect, a computer-implemented method receives a message and a secret key. A hash function is built based on...
US20110307707 METHOD AND SYSTEM FOR SECURING A FILE  
A method for securing files. The method includes an n-bit generator, executing on a first member of a group, generating a message digest using a first secret and a file constant value. The file...
US20140122892 INSURING INTEGRITY OF REMOTE PROCEDURE CALLS USED IN A CLIENT AND SERVER STORAGE SYSTEM  
A system and method generates a message integrity check. The message integrity check value is computed by hashing one or more block checksums from procedure specific parameters of an RPC and then...
US20100250950 COMMUNICATION APPARATUS  
A communication apparatus includes: a first storage unit storing a received electronic mail; a verification unit executing a first verification about an electronic signature attached to the...
US20110271117 USER EQUIPMENT (UE), HOME AGENT NODE (HA), METHODS, AND TELECOMMUNICATIONS SYSTEM FOR HOME NETWORK PREFIX (HNP) ASSIGNMENT  
A User Equipment (UE), Home Agent node (HA), methods, and a telecommunications system are provided for use during negotiation of IP security associations, such as during an Internet Key Exchange...
US20100169657 Message authentication code with blind factorization and randomization  
The message authentication code with blind factorization and randomization is a computational method for improving the security of existing Message Authentication Code (MAC) methods through the...
US20150127949 SYSTEM AND METHOD FOR INTEGRATED MESH AUTHENTICATION AND ASSOCIATION  
Systems and methods for more efficient mesh associations are disclosed. In some aspects, a non-member device may join a mesh network via a four way message exchange with any member device of the...
US20110055582 HASH FUNCTION USING A DOMINO GAME PROCESS  
In the computer data security field, cryptographic hash function processes are embodied in a computer system and may be keyless, but are highly secure. The processes are based on the type of...
US20110007895 Secure Configuration of a Computing Device  
In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital...
US20110161674 DOCUMENT AUTHENTICATION USING DOCUMENT DIGEST VERIFICATION BY REMOTE SERVER  
A method of generating a self-authenticating document while utilizing document digest stored on a server for verification purposes. Authentication information for the document is encoded in...
US20120297199 SECURE CONFIGURATION OF COMPUTING DEVICE  
In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital...
US20140298036 SYSTEM AND METHOD FOR PROTECTING SECRETS FILE  
A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The...
US20110307705 SYSTEM AND METHOD FOR PROTECTING SECRETS FILE  
A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The...
US20140019763 METHODS AND APPARATUS FOR AUTHENTICATION  
Message authentication in an ad-hoc network. Upon creation of a message, a message authentication code is created using a key shared with members of a group comprising a subset of nodes of the...
US20150149786 NETWORK STORAGE SYSTEM FOR A DOWNLOAD INTENSIVE ENVIRONMENT  
A network storage system for a download intensive environment is provided. The network storage comprises at least a data storage server (DSS) that includes an interface enabling connection of the...
US20110029780 Systems and Methods for Conducting Transactions and Communications Using a Trusted Third Party  
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track,...
US20130054974 PACKET SOURCE AUTHENTICATION METHOD USING SINGLE-BUFFERED HASH IN MULTICAST ENVIRONMENT AND APPARATUS FOR THE SAME  
A source authentication method and apparatus according to the present invention are disclosed. The source authentication method is performed with respect to a transmission packet on a message...
US20070143629 METHOD TO VERIFY THE INTEGRITY OF COMPONENTS ON A TRUSTED PLATFORM USING INTEGRITY DATABASE SERVICES  
A client platform can be verified prior to being granted access to a resource or service on a network by validating individual hardware and software components of the client platform. Digests are...
US20120278629 SYSTEM AND METHOD FOR SECURE AUTHENTICATION OF A "SMART" BATTERY BY A HOST  
Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for...
US20060224894 Methods, devices and computer programs for creating ciphertext, plaintext and a cryptographic key  
In an embodiment of a method of creating ciphertext, the embodiment includes the step of providing an authority with a piece of information that is associated with an entity. The embodiment also...
US20100169658 Elliptic curve-based message authentication code  
The elliptic curve-based message authentication code is a computational method for improving the security of existing message authentication code (MAC) generating methods through the use of...
US20110099367 KEY CERTIFICATION IN ONE ROUND TRIP  
Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client...
US20120284524 LOW OVERHEAD NONCE CONSTRUCTION FOR MESSAGE SECURITY  
A system and method for data encryption/decryption and authentication using a relatively long security sequence number (SSN). The SSN is used both to encrypt data and to compute a message...
US20090240764 NETWORK STORAGE SYSTEM FOR A DOWNLOAD INTENSIVE ENVIRONMENT  
A network storage system for a download intensive environment is provided. The network storage comprises at least a data storage server (DSS) that includes an interface enabling connection of the...
US20140122893 Multi-Tier Wireless Home Mesh Network with a Secure Network Discovery Protocol  
An apparatus, system and method for a multi-tier wireless home mesh network is described. The method may include formation of an infrastructure-less wireless home mesh networking environment...
US20110093714 SYSTEMS AND METHODS FOR ASYMMETRIC CRYPTOGRAPHIC ACCESSORY AUTHENTICATION  
Embodiments relate to systems, methods and devices for asymmetric cryptographic authentication. In an embodiment, a system includes an accessory comprising an authentication chip, the...
US20060195695 Techniques for verification of electronic device pairing  
Techniques for verification of device pairing.
US20110055581 HASH FUNCTION BASED ON PAINTING TECHNIQUES  
In the computer data security field, this disclosure is of cryptographic hash function processes embodied in a computer system and which may be keyless, but are highly secure. The processes are...
US20060265590 Digital signature/certificate for hard-copy documents  
A hard-copy authentication document is a physical manifestation of a digital signature or a physical manifestation of a public key affixed to a hard-copy document or physical object, respectively....
US20070192631 Encryption key in a storage system  
A storage device has a storage medium, a key generator and a controller. The key generator generates an encryption/decryption key from selected bits of program code within the storage device. The...
US20060156008 Last line of defense ensuring and enforcing sufficiently valid/current code  
A computer is adapted for self-validation using a dedicated validation circuit or process. The validation circuit may include a timing circuit for activating the validation process, a verification...
US20090327736 Insider attack defense for network client validation of network management frames  
Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined...
US20110035597 SECURE INDIRECT ADDRESSING  
An efficient solution for secure implementation of indirect addressing (IA) is described. IA may be used, for example, in networks of which the routing algorithms are not capable of multicast but...
US20100318804 SCHEME OF APPLYING THE MODIFIED POLYNOMIAL-BASED HASH FUNCTION IN THE DIGITAL SIGNATURE ALGORITHM BASED ON THE DIVISION ALGORITHM  
The present invention relates specifically to a modified digital signature algorithm together with a polynomial-based hash function, in which the last step of the calculation of the final hash...
US20110167268 NETWORK DEVICE AUTHENTICATION  
In general, this disclosure relates to maintaining security between an optical network terminal (ONT) and an optical network aggregation device in an Active Ethernet network. An optical network...
US20110231665 METHOD OF PERFORMING AUTHENTICATION BETWEEN NETWORK NODES  
A method of authentication between first (QNodeX) and second (QNodeY) network nodes within a network suitable for implementing quantum cryptography comprises steps in which the first and second...
US20110191585 Device Authentication  
Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of...
US20090164794 Digital Content Storage Process  
The digital content store provides users with an opportunity to purchase authorized usage of digital content, such as single or multiple music tracks, video, movies, and/or video games. The users...
US20140245021 STORAGE SYSTEM IN WHICH FICTITIOUS INFORMATION IS PREVENTED  
According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the...
US20130326227 AUTHENTICATION APPARATUS, AUTHENTICATION SYSTEM, AUTHENTICATION METHOD AND STORAGE MEDIUM  
The first authentication unit of an authentication apparatus decides whether first authentication data exists in a received message, and performs, if it is decided that the first authentication...
US20070043957 Method for managing an executable code downloaded in a reprogrammable reprogrammable on-board system  
A method for managing an original executable code downloaded into a reprogrammable computer on-board system such as a microprocessor card. The code includes a cryptographic signature and is...
US20060156015 Secure indirect addressing  
An efficient solution for secure implementation of indirect addressing (IA) is described. IA may be used, for example, in networks of which the routing algorithms are not capable of multicast but...
US20070028116 Data collation system and method  
A data collation system and method is disclosed that utilise a central repository, a collection agent, one or more branch agents and one or more leaf agents. Each of the leaf agents is associated...
US20120166809 SYSTEM AND METHOD FOR CRYPTOGRAPHIC KEY EXCHANGE USING MATRICES  
Two parties can establish a cryptographic key using a matrix based key exchange protocol, for secure communications without any prior distribution of secret keys or other secret data, and without...
US20120030472 AUTHENTICATION METHOD, SYSTEM, SERVER, AND CLIENT  
An authentication method is disclosed herein. The method includes: by a server, using a Trigger message nonce to generate a Trigger message, and sending the generated Trigger message to a client...
US20150012754 SYSTEM FOR GENERATING A SECURITY DOCUMENT  
A system for generating a security document includes a plurality of computing nodes forming a computing cluster, each computing node having a node identifier for uniquely identifying the node...
US20070234055 Communication system, network device and program  
There is provided a communication system in which a network device and an information processing device are communicatably connected to each other through a network. The network device comprises a...
US20070043947 Providing multimedia system security to removable user identity modules  
The present invention provides a method of authenticating a user identity module to an entry node of a wireless communication system. The method may include receiving a first challenge formed...
US20090254756 Data communication method  
A data communication method capable of performing a synchronization processing at two or more computer terminals while ensuring security. A server certificate and a public key are transmitted...
US20130145169 EFFICIENT AUTHENTICATION FOR MOBILE AND PERVASIVE COMPUTING  
A method and system for authenticating messages is provided. A message authentication system generates an encrypted message by encrypting with a key a combination of a message and a nonce. The...
Matches 1 - 50 out of 245 1 2 3 4 5 >