Match Document Document Title
RE45532 Mobile host using a virtual single account client and server system for network access and management  
A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password,...
9043872 Selective management controller authenticated access control to host mapped resources  
An information handling system includes a host mapped general purpose input output (GPIO), a shared memory, a board management controller, and a cryptography engine. The host mapped GPIO includes...
9042553 Communicating device and communicating method  
The debugging unit writes a public key of the key issuing server and an initializing program given from outside, to the storage unit. The instruction executing unit reads and executes the...
9042555 On-demand download of partial encrypted content for partial super distributed content  
A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super...
9032208 Communication terminal, communication system, communication method and communication program  
A communication terminal that can adjust which section of a one-time pad cipher key is used and achieve cipher communication when there is a possibility that the one-time pad cipher keys are not...
9026805 Key management using trusted platform modules  
Described herein are techniques for distributed key management (DKM) in cooperation with Trusted Platform Modules (TPMs). The use of TPMs strengthens the storage and processing security...
9021272 Systems and methods for managing cryptographic keys in a secure microcontroller  
The present invention relates to key management in a secure microcontroller, and more particularly, to systems, devices and methods of automatically and transparently employing logic or physical...
9015802 Personally identifiable information detection  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for privacy protection. In one aspect, a method includes accessing personally identifiable...
9015484 Symmetric key distribution framework for the Internet  
A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health...
9009478 Mutual mobile authentication using a key management center  
A system, method, and server computer configured to authenticate a consumer device. The consumer device is authenticated via a mobile gateway using challenge-response authentication. If the...
9002008 System and method for dynamically allocating stream identifiers in a multi-encryption transport system  
The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a second stream depending upon the identifiers in a first stream. The first...
8996862 Client device and local station with digital rights management and methods for use therewith  
A current version certificate is stored that includes a corresponding current version identifier. A current instance certificate is received from the certificate authority, wherein the current...
8995669 Updating shared keys  
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for updating shared keys. In one aspect, a method includes generating, at a first server and...
8995666 Key scheduling device and key scheduling method  
According to one embodiment, in a key scheduling device, a non-linear transformation unit non-linearly transforms at least one of partial keys resulting from dividing an expanded key. A first...
8995661 Information provision system, provision information copying device, user terminal device and user management device  
A content encryption device generates encrypted content and an encrypted content copying device copies the encrypted content on an information storage medium. The storage medium is sold at a...
8989388 Distribution of storage area network encryption keys across data centers  
Efficient mechanisms are provided for transferring key objects associated with disk logical unit numbers and tape cartridges from one data center to another data center. A request is received to...
8989386 Method and device for providing at least one secure cryptographic key  
A device is configured for providing at least one secure cryptographic key for performing a cryptographic security function using a control device which requires a cryptographic key therefor. A...
8989389 Method and apparatus for device-to-device key management  
Various methods for device-to-device key management are provided. One example method includes receiving a communication mode change command requesting a mode change to device-to-device...
8984111 Techniques for providing dynamic account and device management  
Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in...
8977855 Secure function evaluation between semi-honest parties  
Methods and apparatus are provided for secure function evaluation between a semi-honest client and a semi-honest server using an information-theoretic version of garbled circuits (GC). An...
8972880 Application programming interface for transferring content from the web to devices  
A tagging structure is used in web pages to identify content in such web pages that can be dragged and dropped into a wireless device when such web pages are rendered as a component of a web page...
8964990 Automating key rotation in a distributed system  
A material set, such as an asymmetric keypair, is processed using an associated workflow to prepare the material set for activation and/or use. In one embodiment, a material set is generated and...
8958555 Fast computation of a single coefficient in an inverse polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
8958562 Format-preserving cryptographic systems  
Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating...
8959333 Method and system for providing a mesh key  
Method for providing a mesh key which can be used to encrypt messages between a first node and a second node of a mesh network, wherein a session key is generated when authenticating the first...
8953805 Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method  
A secret information server 300 on a network 10 and a client apparatus 100 constitute an authentication information generating system. The secret information server 300 has a function to confirm...
8955085 Device registration system, device registration server, device registration method, device registration program, storage medium, and terminal device  
In a device registration system, user authentication and device authentication of a CE device are executed in a single session, and the user and the CE device are associated with each other if...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8948398 Universal file packager for use with an interoperable keychest  
There is provided a system and method for a universal file packager for use with an interoperable key chest. There is provided a method for distributing media contents to distributors, comprising...
8949605 Communication system, communication apparatus, communication method, and computer program  
Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time. A content using apparatus...
8943318 Secure messaging by key generation information transfer  
A system is configured to receive a first authentication request from a first device, authenticate the first device, establish a secure connection with the first device based on authenticating the...
8938074 Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier  
An apparatus and methods of securely communicating a message between a first device and a second device using a message specific identifier is disclosed. The method begins by assembling the...
8931080 Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource  
A method and system for controlling the execution of a function protected by authentication of a user and which is provided for example for the access to a resource. The method includes inputting,...
8929554 Secure multi-party communication with quantum key distribution managed by trusted authority  
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution (“QKD”) are described herein. In example implementations, a trusted authority...
8923518 Key distribution system, key distribution method, and recording medium  
A key distribution system includes a server and terminal devices constructing an ad-hoc network and communicating with each other with information being encrypted by a key distributed from the...
8913751 Key management and node authentication method for sensor network  
A key management and node authentication method for a sensor network is disclosed. The method comprises the following steps of: 1) keys pre-distribution: before deploying the network,...
8908868 Key rotation with external workflows  
A material set, such as an asymmetric keypair, is processed using an associated workflow to prepare the material set for activation and/or use. In one embodiment, a material set is generated and...
8910252 Peer enrollment method, route updating method, communication system, and relevant devices  
Embodiments of the present invention disclose a peer enrollment method, a route updating method, a communication system, and relevant devices to improve security of a peer-to-peer (P2P) network....
8903084 Efficient key derivation for end-to-end network security with traffic visibility  
Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a...
8897449 Quantum computing on encrypted data  
Quantum computing methods and systems are described. A computing device receives an encrypted state from another device. The encrypted state is stored on a quantum register, and a sequence of...
8897445 Combination-based broadcast encryption method  
A combination-based broadcast encryption method includes: assigning by a server a base group of different combinations to each user; producing and sending secret information for each user by using...
8897442 Encryption device, decryption device, encryption method, decryption method, program, and recording medium  
In encryption, a random number r is generated to generate a ciphertext C2=M(+)R(r), function values HS(r, C2), a common key K, a ciphertext C(Ψ+1) of the random number r using the common key K,...
8880881 Secure communications between devices  
A method of establishing secure communication between a first mobile computing device and a second mobile computing device includes generating a first self-signed key at the first mobile computing...
8879739 Method, system and device for securely transferring digital content between electronic devices within a communication network managed by a management center  
A method for securely transferring digital content between two electronic devices, comprising an activation phase performed by a management center for generating a common network key, calculating...
8875236 Security in communication networks  
Disclosed is a method including allowing an application server to request setup of a session on behalf of a user terminal, and using mechanisms of a generic peer authentication procedure for...
8873760 Service key delivery system  
A Service Key Delivery (SKD) system for delivering a service keys to client devices in a communications network. The delivered service keys are operable to be used to decrypt an encrypted key...
8862867 Method and system for protecting security of the third layer mobility user plane data in NGN  
The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing authentication by a terminal with an...
8855318 Master key generation and distribution for storage area network devices  
Mechanisms are provided for generating a master key used to secure key objects associated with data blocks in a data center. A cryptographic node creation request is received. It is determined...
8856512 Method and system for enterprise network single-sign-on by a manageability engine  
A manageability engine (ME) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (KDC), indicating that the user has...
8856879 Social authentication for account recovery  
A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account...