Match Document Document Title
9037868 System and method for protecting information and related encryption keys  
A system apparatus and method for protecting information are provided. Embodiments of the invention may detect inactivity related to a computing device. Information and encryption key may be...
9008317 Key encryption and decryption  
Provided is a data storage drive for encrypting data, comprising a microprocessor and circuitry coupled to the microprocessor and adapted to receive a session encrypted data key and to decrypt the...
9002018 Encryption key exchange system and method  
The present invention is a computer-implemented key exchange system and methods for improving the usability of encryption technologies such as Public Key Infrastructure (PKI). One aspect of the...
8989389 Method and apparatus for device-to-device key management  
Various methods for device-to-device key management are provided. One example method includes receiving a communication mode change command requesting a mode change to device-to-device...
8990569 Secure communication session setup  
A device receives an encrypted key generating value from a first device and decrypts the encrypted key generating value. A temporary session key associated with the first device is generated based...
8984111 Techniques for providing dynamic account and device management  
Techniques for providing data in dynamic account and device management are disclosed. In one particular exemplary embodiment, the techniques may be realized as a system for providing data in...
8966651 Digital rights management (DRM) locker  
Methods, apparatuses and storage medium associated digital rights management (DRM) using DRM locker is disclosed herein. In embodiments, a DRM locker is provided to a client device. The DRM locker...
8958555 Fast computation of a single coefficient in an inverse polynomial  
In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including:...
8959333 Method and system for providing a mesh key  
Method for providing a mesh key which can be used to encrypt messages between a first node and a second node of a mesh network, wherein a session key is generated when authenticating the first...
8954740 Session key proxy decryption method to secure content in a one-to-many relationship  
A server receives identifying information of a user of a client device and data encrypted with a public key of a group, where the encrypted data includes an encrypted session key for secure...
8948398 Universal file packager for use with an interoperable keychest  
There is provided a system and method for a universal file packager for use with an interoperable key chest. There is provided a method for distributing media contents to distributors, comprising...
8949605 Communication system, communication apparatus, communication method, and computer program  
Content is transmitted within a range of the user's legitimate use while limiting the number of equipment to which the content is transmitted at the same time. A content using apparatus...
8948397 Major management apparatus, authorized management apparatus, electronic apparatus for delegated key management, and key management methods thereof  
A major management apparatus, an authorized management apparatus, an electronic apparatus for delegated key management and key management methods thereof are provided. The major management...
8935532 Content distribution and aggregation  
In an example, a method for secure publication of content is described. The method may include encrypting content with a media key. The method may also include providing the encrypted content to a...
8929554 Secure multi-party communication with quantum key distribution managed by trusted authority  
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution (“QKD”) are described herein. In example implementations, a trusted authority...
8930703 Methods, systems and computer program products for controlling the disclosure time of information  
Methods, systems and computer program products are provided for controlling the disclosure time of information by a publisher to one or more recipients. A trusted body generates an asymmetrical...
8912879 Security system providing temporary personnel access based upon near-field communication and related methods  
A security system may include a plurality of electronic devices, each having a unique identification (ID) associated therewith and configured to generate a temporary security code based upon the...
8914646 Information processing apparatus and information processing method for determining access permission  
An information processing apparatus includes a data processor and a storage. The storage is divided into a protected area to which access is limited and a general purpose area which is freely...
8909943 Verifying identity  
Techniques for encrypting documents in a search index may include: receiving a document for inclusion in a search index of a search system, where the document has an associated access control list...
8904193 Method for operating a security device  
A method for operating a security device includes a microcontroller, a protected memory area, in which at least one item of protection-worthy information is stored, and a unit, the microcontroller...
8903095 Methods and apparatuses for avoiding damage in network attacks  
Methods and apparatuses in a client terminal (400) and a web server (402) for enabling safe communication between said terminal and server. When the terminal obtains a web page from the server in...
8891773 System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions  
Aspects of the disclosure pertain to a system and method for key wrapping via a storage system to allow secure access to media of the system by multiple authorities with modifiable permissions....
8880879 Accelerated cryptography with an encryption attribute  
Methods and systems for encrypting and decrypting are presented. In one embodiment, the method comprises encrypting one or more segments of a data with a key. The data is associated with at least...
8874896 Secure processing systems and methods  
This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain...
8862881 Method and system for mutual authentication of wireless communication network nodes  
A method and system for mutually authenticating a first node and a second node operating in a wireless communication network enables mutual authentication when the first node and the second node...
8862867 Method and system for protecting security of the third layer mobility user plane data in NGN  
The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing authentication by a terminal with an...
8856512 Method and system for enterprise network single-sign-on by a manageability engine  
A manageability engine (ME) receives an authentication response from a user during pre-boot authentication and registers the user with a key distribution center (KDC), indicating that the user has...
8855306 Node distributed with group key and group key updating  
According to one embodiment, a node that is a root node of a network forming a directed acyclic graph topology, which is composed of plural nodes including the node serving as the root node and...
8850195 Tethered device systems and methods  
Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated...
8848923 Key distribution scheme for networks of information  
A method for control ling information object (102) usage in a network of information (100) wherein information objects (102) are identified by information object identities and locations of the...
8837737 Key management in a communication network  
A method and apparatus for key management in a communication network. A Key Management Terminal KMS Terminal Server (KMS) receives from a first device a request for a token associated with a user...
8837738 Methods, systems, and apparatuses for optimal group key management for secure multicast communication  
Apparatuses, systems, and methods for optimal group key (OGK) management that may achieve non-colluding and/or the storage-communication optimality are disclosed. In some embodiments, a group...
8831227 Method and system for establishing secure connection between stations  
A method and system for establishing a secure connection between stations are disclosed. The method includes that: 1) a switch device receives an inter-station key request packet sent by a first...
8831228 System and method for decentralized management of keys and policies  
Various embodiments of a system and method for decentralized management of keys and policies are described. Various embodiments may include a computer system configured to receive a request from a...
8832429 Smart grid and method for operating a smart grid  
Method for operating a smart grid including a plurality of smart meters configured to monitor at least one physical measured quantity and to provide measurement results of the at least one...
8819452 Efficient storage of encrypted data in a dispersed storage network  
A method begins with a processing module obtaining data to store and determining whether substantially similar data to the data is stored. When the substantially similar data is not stored, the...
8819456 Content receiving terminal, content exporting and reproducing method, and recording medium  
A content exporting and reproducing method includes i) a content export step of encrypting a decryption key for content, that is used for decrypting the encrypted content, by using an encryption...
8812959 Method and system for delivering digital content  
A method, computer program, and system for delivering digital content to a user interface. A method according to an embodiment includes: generating a starting content on the user interface...
8800007 VPN session migration across clients  
In general, techniques are described for seamlessly migrating a secure session established between a first computing device and a secure access appliance to a second computing device. In one...
8798272 Systems and methods for managing multiple keys for file encryption and decryption  
Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To...
8793492 Methods and systems for scalable distribution of protected content  
A computerized device can implement a content player to access a content stream using a network interface, the content stream comprising encrypted content and an embedded license comprising a...
8788807 Privacy protection in communication systems  
Methods and apparatus for protecting user privacy in a shared key system. According to one aspect, a user generates a derived identity based on a key and a session variable, and sends the derived...
8788304 Digital rights management provision apparatus, system, and method  
Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM...
8788811 Server-side key generation for non-token clients  
A method and system for server-side key generation for non-token clients is described.
8787573 Cipher communication method and apparatus for the same  
A cipher communication method for an encryption apparatus an includes: receiving a second encryption key while performing a cipher communication using a first encryption key; storing encryption...
8782803 System and method of encrypting a derivative work using a cipher created from its source  
A derivative work is encrypted using a cipher created from digital sources used to create the derivative work. A software application made available for download permits a mix artist to generate a...
8781132 Method and device for managing encrypted group rekeying in a radio network link layer encryption system  
Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link...
8775794 System and method for end to end encryption  
Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a...
8768849 Digital rights management provision apparatus, system, and method  
Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM...
8763156 Digital receipt for use with an interoperable keychest  
There is provided a system and method for a digital receipt for use with an interoperable keychest. There is provided a method for online registration of a digital receipt associated with a...