Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 71488. Отображено 100.
05-01-2012 дата публикации

Privacy-sensitive sample analysis

Номер: US20120005098A1
Принадлежит: International Business Machines Corp

Processes are described for provision of privacy-sensitive sample analysis results to a sample provider. The sample provider generates a cryptographic commitment encoding a secret value, r, and a sample identifier, s, associated with a sample container. The sample provider provides the commitment to an analysis provider in association with the sample container containing a sample for analysis. The analysis provider analyzes the sample to obtain a set of analysis results corresponding to the sample identifier, s, and generates a cryptographic pre-credential, σ′, corresponding to the sample identifier, s. The pre-credential, σ′, encodes the set of analysis results and the commitment. Completion of the pre-credential, σ′, requires knowledge of the secret value, r, in the commitment. In response to cryptographic proof of knowledge by the sample provider of at least the secret value, r, in the commitment encoded in the pre-credential, σ′, corresponding to the sample identifier, s, the analysis provider supplies the pre-credential, σ′, to the sample provider. The sample provider then completes the pre-credential, σ′ using the secret value, r, to obtain a cryptographic credential, σ, encoding the set of analysis results.

Подробнее
12-01-2012 дата публикации

Method and apparatus for a content protecting and packaging system for protecting a content package

Номер: US20120008777A1
Принадлежит: Nokia Oyj

An apparatus for providing an improved content protecting and packaging system for protecting content may include an extractor for extracting a content package into a plurality of content segments including a first portion and a second portion. An enveloper may envelop each of the content segments in the first portion separately to thereby create one or more protected content segments. Further, a packager may package the protected content segments with the second portion of the content segments into a protected content package, which may then be uploaded to a distributor for distribution to user terminals. A corresponding method and computer program product are also provided.

Подробнее
19-01-2012 дата публикации

Perimeter encryption method and system

Номер: US20120017078A1
Принадлежит: Computer Associates Think Inc

A method and system for consistent format preserving encryption (C-FPE) are provided to protect sensitive data while the sensitive data is in a domain while allowing encrypted sensitive data to be treated inside the domain as if it were the unencrypted sensitive data. The method includes inserting a transparent coupling into a data flow at a perimeter of the domain, and translating a sensitive data element from an unprotected data element to a protected data element using the transparent coupling such that the sensitive data element is a protected data element within the domain.

Подробнее
19-01-2012 дата публикации

Secure Acknowledgment Device For One-Way Data Transfer System

Номер: US20120017079A1
Принадлежит: OWL Computing Technologies Inc

An apparatus for relaying a hashed message from a first node to a second node, comprising an inlet interface for receiving a message from the first node, a hash number calculator for hashing the message from the inlet interface, an outlet interface for sending the hashed message to the second node, a first one-way data link for unidirectional transfer from the inlet interface to the hash number calculator, and a second one-way data link for unidirectional transfer from the hash number calculator to the outlet interface, is provided. While the apparatus is capable of bidirectional communications with either or both of the first and second nodes through the respective interfaces, the unidirectionality of data flow through the apparatus is strictly enforced by the hardware of the apparatus. The apparatus provides a secure mechanism and communication channel for relaying hashed acknowledgment messages from a receive node to a send node to inform the status of data transfer from the send node to the receive node across a one-way data link. The apparatus may be further implemented with the capability of comparing hashed messages from the two nodes.

Подробнее
26-01-2012 дата публикации

Mechanism for partial encryption of data streams

Номер: US20120020475A1
Принадлежит: Silicon Image Inc

Embodiments of the invention are generally directed to partial encryption of data stream. An embodiment of a method includes receiving, at a data transmitting device, a data stream having content including one or more of audio content, video content, and control content, determining one or more content that are to be encrypted. The method further includes partially encrypting the data stream by encrypting the one or more content, and leaving other content unencrypted, and transmitting, from the data transmitting device, the partially encrypted data stream to a data receiving device.

Подробнее
26-01-2012 дата публикации

Method for Performing a Cryptographic Task in an Electronic Hardware Component

Номер: US20120020476A1
Принадлежит: France Telecom SA

A method and apparatus are provided to perform a cryptographic task on at least one numerical datum in an electronic hardware component. The method includes a step of at least partial use of an encryption function. This encryption function includes a basic encryption function obtained by the addition between an intermediate function arising from composition of a coding function with a first function, and a second function. This method can be applied to the encryption of a datum or to the decryption of a datum. Also, a method is provided for generating a public key and a device able to implement one of these methods.

Подробнее
02-02-2012 дата публикации

Relay device, wireless communications device, network system, program storage medium, and method

Номер: US20120030466A1
Автор: Satoru Yamaguchi
Принадлежит: BUFFALO INC

A relay device first uses latest authentication data to determine whether request-authentication data transmitted from a wireless communications device is valid. If the latest authentication data is used to determine that the request-authentication data is valid, the relay device carries out relayed communications with the wireless communications device. If the latest authentication data is used to determine that the request-authentication data is invalid, the relay device next uses a former authentication data to determine whether the request-authentication data is valid. If the former authentication data is used to determine that the request-authentication data is valid, the relay device provides the wireless communications device with the latest authentication data to update authentication data in the wireless communications device.

Подробнее
02-02-2012 дата публикации

Methods and systems for facilitating communications between vehicles and service providers

Номер: US20120030467A1
Автор: Mark S. Schaefer
Принадлежит: GENERAL MOTORS LLC

Methods and systems for facilitating communications between a vehicle and a service provider are provided. A first address of a vehicle communication device and a second address of a service provider communication device are obtained at a remote location that is remote to both the vehicle and the service provider. A set of keys, including a first key and a second key, is generated at the remote server. The first key is for use by the vehicle in establishing communications with the service provider, and the second key is for use by the service provider in establishing communications with the vehicle. The first key is provided to the vehicle, and the second key is provided to the service provider.

Подробнее
02-02-2012 дата публикации

Battery pack and electronic apparatus

Номер: US20120030480A1

A battery pack includes at least one rechargeable battery configured to output power; a remaining battery capacity detection unit configured to detect a remaining battery capacity of the at least one rechargeable battery; and a cryptographic unit configured to output a response word in response to an external request word by encrypting the external request word based on a cryptographic algorithm with a common code key.

Подробнее
09-02-2012 дата публикации

Secure and verifiable data handling

Номер: US20120036366A1
Принадлежит: Microsoft Corp

The described implementations relate to secure and verifiable data handling. One implementation can receive a request to upload information, wherein the information includes a referencing element and at least one blob of referenced data. This implementation can also receive a chunk of an individual blob. The chunk can include multiple blocks. Individual blocks can be hashed. Upon receipt of an indication that all chunks have been uploaded, this implementation can create an overall hash of the information from the block hashes rather than from the information.

Подробнее
16-02-2012 дата публикации

Efficient Implementation Of Fully Homomorphic Encryption

Номер: US20120039473A1
Принадлежит: International Business Machines Corp

In one exemplary embodiment of the invention, a method for homomorphic decryption, including: providing a ciphertext with element c, there exists a big set B having N elements z i so B={z 1 ,z 2 , . . . , z N }, there exists a small set S having n elements s j so S={s 1 , s 2 , . . . , s n }, the small set is a subset of the big set, summing up the elements of the small set yields the private key, there exists a bit vector {right arrow over (σ)} having N bits σ i so {right arrow over (σ)}= σ 1 , σ 2 , . . . , σ N , σ i =1 if z i ∈ S else σ i =0, there exists an encrypted vector {right arrow over (d)} having N ciphertexts d i so d= d 1 , d 2 , . . . , d N , d i is an encryption of σ i ; post-processing c by multiplying it by all z i to obtain an intermediate vector {right arrow over (y)}= y 1 , y 2 , . . . , y N with y i computed y i =c×z i ; homomorphically multiplying y i by d i obtaining a ciphertext vector {right arrow over (x)} having N ciphertexts x i so z= x 1 , x 2 , . . . , x N , where x i is an encryption of the product y i ·σ i ; and homomorphically summing all x i to obtain a resulting ciphertext that is an encryption of the at least one bit, where the big set is partitioned into n parts with each part having a plurality of different elements from the big set, where the elements of the small set are one element from each part.

Подробнее
16-02-2012 дата публикации

Method and Apparatus for Implementing Address Privacy in Communications Networks

Номер: US20120042098A1
Принадлежит: Nokia Oyj

Various methods for implementing address privacy in communications networks are provided. One method may include receiving a lower layer address block. The lower layer address block may include a random component and a lower layer solution component. The random component may include a random value and the lower layer solution component may be based at least in part on the random value and a shared key. The method may also include verifying the lower layer address block via the random value and the shared key. The method may further include receiving a higher layer address block. The higher layer address block may include a higher layer solution component. The higher layer solution component may be based at least in part on the random value and a shared key. The method may further include verifying the higher layer address block via the random value and the shared key. Similar apparatuses and computer program products are also provided.

Подробнее
16-02-2012 дата публикации

Method, device, and system for issuing license

Номер: US20120042168A1
Принадлежит: Huawei Technologies Co Ltd

A system for issuing a license includes a Content Issuer (CI) configured to receive a Cooperate-RORequest from a Rights Issuer (RI). The CI encapsulates, according to the information carried in the Cooperate-RORequest, content related information by using a key of a destination entity to obtain an encapsulation key, and generates a Message Authentication Code (MAC) on part of information of a license. The CI sends the generated MAC and obtained encapsulation key to the RI, so that the RI sends the license that includes the MAC and the encapsulation key to the destination entity.

Подробнее
23-02-2012 дата публикации

Apparatus and method for block cipher process for insecure environments

Номер: US20120045050A1
Принадлежит: Apple Inc

Method and apparatus for increasing security of a cryptographic algorithm such as deciphering, enciphering, or a digital signature using a block type cipher such as AES implemented for instance in a “whitebox” model with the cipher key either known or unknown at the compilation time. This method is secure for use in entrusted environments, particularly for securing cryptographic keys. The look up tables characteristic of such algorithms are protected against attack here by making all such tables of the same size and indistinguishable, and further by masking the output values of such tables, typically where the tables carry out a permutation function or a logical exclusive OR operation.

Подробнее
08-03-2012 дата публикации

Security of a multimedia stream

Номер: US20120057697A1
Принадлежит: Nokia Oyj

A method including receiving encrypted multimedia information of a multimedia broadcast multicast service streaming session, wherein the multimedia information is encrypted using an encryption key. An indication allowing to switch the receiving of the encrypted multimedia information to a peer-to-peer streaming session is received and receiving of the encrypted multimedia information from the multimedia broadcast multicast service streaming session to the peer-to-peer streaming session is switched. Encrypted multimedia information of the peer-to-peer streaming session is received.

Подробнее
08-03-2012 дата публикации

Method and system for optimizing authentication procedures in media independent hanodver services

Номер: US20120057706A1
Автор: Anirudh Bhatt
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A method and system for establishing security association mechanism between a Mobile Node (MN) and a plurality of Point of Services (PoS) are provided. The method includes sending a first request from primary PoS to secondary PoS. The primary PoS then receives a first response along with a derived first key. The first key is derived at the secondary PoS. The method further includes receiving a second request from the MN at the primary PoS. The method then derives a second key based on a MN identity and the derived first key. Thereafter, the method sends a second response along with a second key from the primary PoS to the MN. Further, the method establishes communication between the MN and secondary PoS based on the second key received by the MN and the second key generated at the secondary PoS.

Подробнее
08-03-2012 дата публикации

Method of Providing Transactions Employing Advertising Based Verification

Номер: US20120060036A1
Принадлежит: Imation Corp

A method of improving electronic security establishes a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a first predetermined portion of a branded watermark, for instance an advertisement, provided from the institution in conjunction with the request, and a second predetermined portion of the branded watermark being provided upon a personalized device that cannot be intercepted or manipulated by malware, allowing the user to verify that the request as displayed upon the user's primary computing device is valid.

Подробнее
22-03-2012 дата публикации

Control method, apparatus and system

Номер: US20120069855A1
Принадлежит: Huawei Device Co Ltd

The present invention discloses a control method, an apparatus, and a system. In the embodiments of the present invention, a control command is encapsulated into a network data packet to be sent to a remote network driver interface specification (RNDIS) device, and the encapsulated network data packet is sent to the RNDIS device to control the RNDIS device. In the conventional network architecture, a user device can directly send a network data packet to an RNDIS device. Therefore, with this solution, a control command can be transmitted to the RNDIS device without adding a new control interface. Compared with the solution that requires adding a new interface and installing an additional driver program in the prior art, this solution reduces application complexity and has no special requirement for the RNDIS device, which is commonly applicable and easy to implement.

Подробнее
22-03-2012 дата публикации

System for establishing a cryptographic key depending on a physical system

Номер: US20120072737A1
Принадлежит: Intrinsic ID BV

In systems for establishing a cryptographic key depending on a physical uncloneable function (PUF) it may be a problem that internal information correlated with the cryptographic key is leaked to the outside of the system via a side-channel. To mitigate this problem a cryptographic system for reproducibly establishing a cryptographic key is presented. The system comprises a physical system comprising a physical, at least partially random, configuration of components from which an initial bit-string is derived. An error corrector corrects deviations occurring in the initial bit-string. Through the use of randomization the error corrector operates on a randomized data. Information leaking through a side channel is thereby reduced. After error correction a cryptographic key may be derived from the initial bit-string.

Подробнее
29-03-2012 дата публикации

Arithmetic method and apparatus for supporting aes and aria encryption/decryption functions

Номер: US20120076294A1

Provided are an arithmetic method and apparatus for supporting Advanced Encryption Standard (AES) and Academy, Research Institute and Agency (ARIA) encryption/decryption functions. The apparatus includes: a key scheduler for generating a round key using an input key; and a round function calculator for generating encrypted/decrypted data using input data and the round key. Here, the round function calculator includes an integrated substitution layer and an integrated diffusion layer capable of performing both AES and ARIA algorithms.

Подробнее
29-03-2012 дата публикации

Method, device, and system for deriving keys

Номер: US20120077501A1
Принадлежит: Huawei Technologies Co Ltd

Method, device, and system for deriving keys are provided in the field of mobile communications technologies. The method for deriving keys may be used, for example, in a handover process of a User Equipment (UE) from an Evolved Universal Terrestrial Radio Access Network (EUTRAN) to a Universal Terrestrial Radio Access Network (UTRAN). If a failure occurred in a first handover, the method ensures that the key derived by a source Mobility Management Entity (MME) for a second handover process of the UE is different from the key derived for the first handover process of the UE. This is done by changing input parameters used in the key derivation, so as to prevent the situation in the prior art that once the key used on one Radio Network Controller (RNC) is obtained, the keys on other RNCs can be derived accordingly, thereby enhancing the network security.

Подробнее
05-04-2012 дата публикации

Surveillance network system

Номер: US20120084839A1
Принадлежит: Boeing Co

Embodiments of a sensor network system provide surveillance capabilities in multiple contexts/environments (e.g., military, commercial, scientific, civic, urban, wilderness, etc.). Network nodes may include devices such as sensors, network routers, network controllers, etc. Network sensors may be configured so that power management objectives are maximized. Network sensors (both individually and as a group) may be capable of intelligent and cooperative information gathering, so that the output of the sensor network does not contain high levels of irrelevant information. The network nodes may communicate among one another via one or more communication links, and in some cases, multiple routes between any two network nodes may be available. The sensor network may include aspects of both high data rate and low data rate network features. One or more network controllers may provide various network management capabilities, including management of network routing, information collection, information exportation, network configuration, etc.

Подробнее
12-04-2012 дата публикации

Systems and methods for rfid security

Номер: US20120087501A1
Принадлежит: RADIOFY LLC

An RFID system includes an RFID tag, an RFID reader, and a server. The RFID tag communicates to the server via encrypted information. The information may be encrypted with synchronized encryption keys. In this manner, the reader need not decrypt the information from the RFID tag. The effectiveness of malicious readers is thereby reduced, resulting in improved RFID tag security.

Подробнее
12-04-2012 дата публикации

Privacy-Preserving Metering

Номер: US20120089494A1
Принадлежит: Microsoft Corp

Privacy protecting metering is described such as for electricity, gas or water metering, metering use of cloud computing resources, traffic congestion charging and other metering applications. In examples, fine grained user consumption data is kept private and not disclosed to a provider of a resource consumed by the user. In examples, a bill generator receives certified meter readings and a certified pricing policy and generates a bill which omits fine grained user consumption data. For example, the bill generator generates a zero knowledge proof that the bill is correct and sends that proof to a provider together with the bill. In examples a provider is able to check that the bill is correct using the zero knowledge proof without finding out the user's private consumption data. In an embodiment the pricing policy is stored as signed rows of a table to enable efficient generation of the zero knowledge proof.

Подробнее
12-04-2012 дата публикации

System and method for controlling data communications between a server and a client device

Номер: US20120089840A1
Принадлежит: Research in Motion Ltd

A system and method for controlling data communications between a server and a client device, such as a mobile device. Embodiments relate generally to a technique where stop data is provided to the client device. This stop data can be transmitted (e.g. by the client device) to the server. When processed by the server, the stop data indicates to the server that at least some of the encrypted data received by the client device from the server was not decrypted using the second key (e.g. as may be the case when the second key has been deleted). Upon receiving the stop data, the server may, for example, withhold the transmission of data encrypted with the first key to the client device until the second key is restored on the client device. In one embodiment, the stop data is provided to the client device in an encoded (e.g. encrypted) form.

Подробнее
26-04-2012 дата публикации

Managing data delivery based on device state

Номер: US20120102139A1
Принадлежит: Microsoft Corp

Managing power-consuming resources on a first computing device by adjusting data delivery from a plurality of second computing devices based on a state of the first computing device. The state of the first computing device is provided to the second computing devices to alter the data delivery. In some embodiments, the first computing device provides the second computing devices with actions or commands relating to data delivery based on the device state. For example, the second computing devices are instructed to store the data, forward the data, forward only high priority data, or perform other actions. Managing the data delivery from the second computing devices preserves battery life of the first computing device.

Подробнее
03-05-2012 дата публикации

Implementing physically unclonable function (puf) utilizing edram memory cell capacitance variation

Номер: US20120106235A1
Принадлежит: International Business Machines Corp

A method and embedded dynamic random access memory (EDRAM) circuit for implementing a physically unclonable function (PUF), and a design structure on which the subject circuit resides are provided. An embedded dynamic random access memory (EDRAM) circuit includes a first EDRAM memory cell including a memory cell true storage capacitor and a second EDRAM memory cell including a memory cell complement storage capacitor. The memory cell true storage capacitor and the memory cell complement storage capacitor include, for example, trench capacitors or metal insulator metal capacitors (MIM caps). A random variation of memory cell capacitance is used to implement the physically unclonable function. Each memory cell is connected to differential inputs to a sense amplifier. The first and second EDRAM memory cells are written to zero and then the first and second EDRAM memory cells are differentially sensed and the difference is amplified to consistently read the same random data.

Подробнее
03-05-2012 дата публикации

Managing Multicast Membership in Wireless LANs

Номер: US20120106547A1
Автор: Ramsundar Janakiraman
Принадлежит: Aruba Networks Inc

Processing of MLD control packets in an access point (AP) connected to a digital network. According to the present invention, an AP in a network converts MLD queries from multicast to unicast and sends these unicast packets to each client of the AP. These MLD query packets may be filtered or restricted by per-user client rules These MLD query packets may also be tagged as high priority packets to speed their delivery. The AP also suppresses the retransmission of MLD Join packets to clients of the AP.

Подробнее
03-05-2012 дата публикации

Techniques for mobile device authentication

Номер: US20120110329A1
Принадлежит: Individual

A user authenticates a mobile device (MD) to a network-based service (NBS) for initial authentication. Policy is pushed from the NBS to the MD and the MD automatically obtains details about devices and attributes that are near or accessible to the MD in accordance with the policy. The details are pushed as a packet from the MD to the NBS and multifactor authentication is performed based on the details and the policy. If the multifactor authentication is successful, access privileges are set for the MD for accessing the NBS and perhaps for accessing local resources of the MD.

Подробнее
17-05-2012 дата публикации

System and Methods for Silencing Hardware Backdoors

Номер: US20120124393A1
Принадлежит: Columbia University of New York

Methods for preventing activation of hardware backdoors installed in a digital circuit, the digital circuit comprising one or more hardware units to be protected. A timer is repeatedly initiated for a period less than a validation epoch, and the hardware units are reset upon expiration of the timer to prevent activation of a time-based backdoor. Data being sent to the hardware unit is encrypted in an encryption element to render it unrecognizable to a single-shot cheat code hardware backdoor present in the hardware unit. The instructions being sent to the hardware unit are reordered randomly or pseudo-randomly, with determined sequential restraints, using an reordering element, to render an activation instruction sequence embedded in the instructions unrecognizable to a sequence cheat code hardware backdoor present in the hardware unit.

Подробнее
24-05-2012 дата публикации

Transaction verification on rfid enabled payment and transaction instruments

Номер: US20120130905A1
Автор: Ersin Uzun, Gene Tsudik
Принадлежит: UNIVERSITY OF CALIFORNIA

A display enabled RFID tag (DERT) receives transaction details from the reader. DERT verifies that the details match their counterparts in the reader public key certificate. The process is aborted in case of a mismatch. DERT extracts and displays user-verifiable data. It then enters a countdown stage that lasts for a predetermined duration. A user observes the transaction information and, if the transaction amount and other details are deemed correct, presses an accept button provided on the DERT before the timer runs out. DERT signs the time-stamped transaction statement and sends it to the reader. This signed statement is then sent to the payment gateway and eventually to the financial institution that issued the payment DERT.

Подробнее
24-05-2012 дата публикации

Device archiving of past cluster binding information on a broadcast encryption-based network

Номер: US20120131337A1
Принадлежит: International Business Machines Corp

Provided are techniques for the creation and storage of an archive for binding IDs corresponding to a cluster of devices that render content protected by a broadcast encryption scheme. When two or more clusters are merged, a binding ID corresponding to one of the clusters is selected and a new management key is generated. Binding IDs associated with the clusters other than the cluster associated with the selected binding ID are encrypted using the new management key and stored on a cluster-authorized device in a binding ID archive. Content stored in conformity with an outdated binding ID is retrieved by decrypting the binding ID archive with the management key, recalculating an old management key and decrypting the stored content.

Подробнее
24-05-2012 дата публикации

Processing performance of repeated device compliance update messages

Номер: US20120131638A1
Принадлежит: International Business Machines Corp

A message comprising an indication of a management key block and an indication of an authorization table is received at a first network device from a second network device. The indication of the management key block, the indication of the authorization table, and a response message generated based on validating the indication of the management key block and the indication of the authorization table are stored. A second message comprising a second indication of the management key block and a second indication of the authorization table is received at the first network device from the second network device. The first network device communicates with the second network device in accordance with the stored response associated with the first message on determining that the second indication management key block and the second indication of the authorization table match corresponding stored indications of the management key block and the authorization table.

Подробнее
07-06-2012 дата публикации

Communication apparatus, control method for communication apparatus, and program

Номер: US20120144199A1
Автор: Toshifumi Hamachi
Принадлежит: Canon Inc

A communication apparatus of the present invention is a communication apparatus that communicates with a plurality of other communication apparatuses, and starts processing for setting an address for the communication apparatus using encrypted communication when encrypted communication with the plurality of communication apparatuses becomes possible by sharing encryption keys for encrypting communication with the other communication apparatuses.

Подробнее
14-06-2012 дата публикации

Methods and systems for encoding and protecting data using digital signature and watermarking techniques

Номер: US20120151216A1
Принадлежит: Intertrust Technologies Corp

Systems and methods are provided for protecting and managing electronic data signals. In one embodiment a strong watermark is inserted in a data signal that is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The signal is then stored and distributed. When attempts are made to use or access the signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If not found, the signal is checked for the presence of the strong watermark, which if found causes the system to inhibit further use of the signal, and if not found further use of the signal is allowed.

Подробнее
14-06-2012 дата публикации

Security usb storage medium generation and decryption method, and medium recorded with program for generating security usb storage medium

Номер: US20120151219A1
Автор: Daegull Ryu, Secheol Oh
Принадлежит: MW STORY CO Ltd

The present invention relates to a security USB storage medium generation and decryption method, and a medium having the record of a program for the generation of a security USB storage medium. The generation method of the present invention is for a USB host constituted by a USB connection port, an input interface, an output interface, a storage unit and a host control unit to code a USB storage medium constituted by a USB interface, a storage region and a USB control unit so as to generate a security USB storage medium, the method comprising the steps of: in the host control unit, outputting through the output interface information that requests for the input of a 1st user password to be set, when the connection of the USB interface to the USB connection port is detected; generating a random key and a disk key based on a 1st user password that is input from the input interface in response to the request for the input of the 1st user password; hashing the 1st user password and the random key after the random key and the disk key are generated, so as to generate a 1st encryption and decryption key; and generating a security volume header by dividing the storage region into a header and a body using the 1st encryption and decryption key, encrypting a 1st data and then storing the data in the header, and also generating a security volume body by encrypting a 2nd data using the disk key and then storing the data in the body. In this manner, no one is allowed to read the content stored in the USB storage medium through a disk dump for example without inputting a user password that was input during the generation of security volume, thereby increasing the security of the USB storage medium.

Подробнее
14-06-2012 дата публикации

Personalized digital media access system (pdmas)

Номер: US20120151220A1
Автор: William Grecia
Принадлежит: Individual

The invention is an apparatus that facilitates access to encrypted digital media to accept verification and authentication from an excelsior enabler using at least one token and at least one electronic identification. The at least one electronic identification could be a device serial number, a networking MAC address, or a membership ID reference from a web service. Access to the product is also managed with a plurality of secondary enablers using the at least one electronic identification reference.

Подробнее
21-06-2012 дата публикации

Evolved Packet System Non Access Stratum Deciphering Using Real-Time LTE Monitoring

Номер: US20120159151A1
Принадлежит: Tektronix Inc

A monitoring system is coupled to interfaces in an LTE network and passively captures packets from the network interfaces. First data packets associated with an authentication and key agreement procedure are captured on a first interface. Second data packets associated with the authentication and key agreement procedure are captured on a second interface. Individual ones of the first data packets are correlated to individual ones of the second data packets based upon a same parameter. An authentication vector table is created comprising information from the correlated first data packets and second data packets, wherein entries in the table comprise authentication data for a plurality of security contexts. A cipher key is identified to decipher additional packets for the user. The cipher key can also be identified in case of Inter Radio Access Technology Handover by the user equipment.

Подробнее
21-06-2012 дата публикации

Digital signatures with error polynomials

Номер: US20120159179A1
Принадлежит: Microsoft Corp

Representations of polynomials a, s, t, e — 1 and e — 2 can be provided. Values of coefficients of the polynomials can be limited, and can be computed using randomization techniques. A verification key can be generated to include representations of polynomials a, b, and c. Computation of b can include computing a product using a and s, and adding e — 1 . Computation of c can include computing a product using a and t, and adding e — 2 . A signing key can represent s and t. The signing key can be used to produce a message signature that can represent a sum of t and a product of s and m, with m being derived from a message to be signed. The verification key can be used to verify the signature by checking coefficient sizes of a polynomial represented by the signature, and of a checking polynomial derived from the verification key and the signature.

Подробнее
21-06-2012 дата публикации

Securing the implementation of a cryptographic process using key expansion

Номер: US20120159186A1
Принадлежит: Apple Inc

In the field of computer enabled cryptography, such as a keyed block cipher having a plurality of rounds, the cipher is hardened against an attack by protecting the cipher key by means of a key expansion process which obscures the cipher and/or the round keys by increasing their lengths to provide an expanded version of the keys for carrying out encryption or decryption using the cipher. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful where the key is derived through a process and so is unknown when the software code embodying the cipher is compiled. This is typically the case where there are many users of the cipher and each has his own key, or where each user session has its own key.

Подробнее
21-06-2012 дата публикации

Communication system, communication device, communication method, and computer program

Номер: US20120159575A1
Принадлежит: Sony Corp

To securely transmit content through remote access via an external network, such as a WAN, while exceeding restrictions of an RTT and a TTL. A way of handling a flag for controlling remote access of content is explicitly defined, and an authentication method is explicitly defined when a content using device performs remote access. Thus, also in remote access, similarly to access of the related art in a household, a copyright protection environment of content based on the DTCP-IP is constructed.

Подробнее
21-06-2012 дата публикации

Mobile out-of-band authentication service

Номер: US20120159603A1
Автор: Tobias Queck
Принадлежит: SAP SE

Certain embodiments enable authentication of an application session at a client machine by using authentication values and user-identification values that are received from a mobile communication device. The mobile communication device provides an out-of-band channel for validating the session and enables secure authentication for a variety of applications.

Подробнее
28-06-2012 дата публикации

Elliptic curve cryptograhy with fragmented key processing and methods for use therewith

Номер: US20120163581A1
Принадлежит: Morega Systems Inc

A cryptography module includes a key store having a plurality of storage locations for storing a private key as k key fragments. One or more crypto-processing segments each operate based on corresponding ones of the k key fragments to process a message in accordance with elliptic curve digital signature algorithm (ECDSA) to produce a signed message.

Подробнее
28-06-2012 дата публикации

Object Processing Employing Movement

Номер: US20120163666A1
Принадлежит: Individual

Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.

Подробнее
28-06-2012 дата публикации

Process and device for authentication

Номер: US20120166800A1
Принадлежит: Advanced Track and Trace SA

The authentication process comprises: a step of generating a random number ( 105 ), a step of generating a time-stamp ( 115 ), a step of generating a first secret key ( 120 ), a step of truncating the message authentication code utilizing said first secret key ( 125 ), a step of symmetrically encrypting the random number, time-stamp and truncation ( 135 ), utilizing a second secret key ( 130 ) to produce an authentication code ( 145 ). Preferably, during the step of generating a random number, a quantum generator ( 100 ) is utilized. Preferably, during the truncation step, a cryptographic message authenticator is generated utilizing the first secret key. Preferably, during the step of symmetrically encrypting the random number, time-stamp and truncation, by utilizing the second secret key, in addition a hash ( 140 ) is produced.

Подробнее
28-06-2012 дата публикации

Method and apparatus for pairing between bluetooth devices

Номер: US20120167176A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

A method and apparatus for pairing between Bluetooth devices, If a pairing between Bluetooth devices is requested, a six-digit passkey is generated in an authentication process based on secure simple pairing (SSP). If a Bluetooth device (BD) address of a correspondent device is pre-registered and there are characters designated to the BD address, the designated characters instead of the passkey are outputted.

Подробнее
05-07-2012 дата публикации

Mobile Communication Devices and Deciphering Methods

Номер: US20120170744A1
Автор: Tsung-Yo Cheng
Принадлежит: Acer Inc

A wireless communications device with a wireless module and a controller module is provided. The wireless module is arranged for performing wireless transmission and reception to and from a service network. The controller module is arranged for receiving a first ciphered data packet from the service network via the wireless module, and deciphering the first ciphered data packet according to a first deciphering parameter. Also, the controller module is arranged for deciphering the first ciphered data packet according to a second deciphering parameter in response to unsuccessful deciphering of the first ciphered data packet according to the first deciphering parameter. Particularly, the second deciphering parameter is for deciphering a second ciphered data packet received prior to the first ciphered data packet from the service network.

Подробнее
05-07-2012 дата публикации

Biometric authentication of mobile financial transactions by trusted service managers

Номер: US20120173434A1
Принадлежит: eBay Inc

A method for authenticating a financial transaction at a point of sale (POS) includes storing an application program in a first secure element of a mobile phone. The application is configured to generate instruction codes to effect the financial transaction upon verification of a user's identity. The user's credentials are stored in a second SE of the phone, which is operable to verify the user's identity from a biometric trait of the user input to the phone and to generate data authenticating the financial transaction in response to the verification of the user's identity. At the POS, the user invokes the application and then inputs a biometric trait to the phone. The second SE verifies the user's identity, and upon verification, generates data authenticating the transaction. The financial transaction data, including the instruction codes and the authenticating data, are then transmitted from the phone to the POS.

Подробнее
05-07-2012 дата публикации

Method And Apparatus For Protecting Against A Rogue Certificate

Номер: US20120173874A1
Принадлежит: Qualcomm Inc

Disclosed is a method for protecting against a rogue certificate. In the method, a web client receives a first certificate from a server during an initial session. The first certificate has a first certificate chain to an authority certificate signed by a certificate authority. The web client receives a second certificate during a subsequent session. The second certificate has a second certificate chain to a signed authority certificate. The web client assigns a signature security rating to each chain certificate in the first and second certificate chains. The web client compares the signature security rating of each corresponding chain certificate in the first and second certificate chains. The web client treats the second certificate as insecure if the signature security rating of a chain certificate in the second certificate chain is lowered from that of a corresponding chain certificate in the first certificate chain.

Подробнее
05-07-2012 дата публикации

Pluggable transceiver module with enhanced circuitry

Номер: US20120173935A1
Принадлежит: Brocade Communications Systems LLC

Pluggable transceiver modules with additional functions and circuitry contained within the module. In a first embodiment, additional circuitry is added to determine bit error rates at the point of the module itself. This allows a much better diagnostic evaluation of location of problem. In an alternate embodiment, various logic is placed in the module. In a first alternate embodiment encryption/decryption units are placed in the converter module so that encryption and decryption operations on the serial bitstream do not need to be performed in a switch. Existing switches can be used but the interconnecting links can still be encrypted. A second alternate embodiment includes compression/decompression units placed in the module to allow effective higher throughput on the selected links.

Подробнее
12-07-2012 дата публикации

Method, Transponder, and System for Secure Data Exchange

Номер: US20120176229A1
Принадлежит: Individual

A method may include generating by a transponder a first code and transmitting the first code to a base station. The base station may generate first transmission information, encoding a base station code with a first identification and a first random number code, and may transmit the first transmission information to the transponder. The transponder may extract the base station code. A second code may be generated by the transponder and transmitted to the base station upon an associated request from the base station. Before transmission to the base station, the second code may be encoded with the extracted base station code. Second encoded transmission information comprising a second identification may be generated by the base station using the second code and transmitted to the transponder. A memory region of the transponder may be released for read and/or write access after the second identification was verified as valid.

Подробнее
19-07-2012 дата публикации

Apparatus and method for generating a key for broadcast encryption

Номер: US20120183136A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

An apparatus and method for generating a key for a broadcast encryption. The apparatus includes a node secret generator for managing a user that receives broadcast data in a tree structure and for generating a unique node secret for each node in the tree structure. The apparatus also includes an instant key generator for temporarily generating an instant key used at all nodes in common in the tree structure, and a node key generator for generating a node key for each node by operating the node secret generated at the node secret generator and the instant key generated at the instant key generator. Thus, key update can be efficiently achieved.

Подробнее
19-07-2012 дата публикации

Receiver non-repudiation via a secure device

Номер: US20120183145A1
Принадлежит: Apple Inc

Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.

Подробнее
19-07-2012 дата публикации

Methods and Systems for Scalable Distribution of Protected Content

Номер: US20120185695A1
Автор: Kunal Shah, Sunil Agrawal
Принадлежит: Adobe Systems Inc

A computerized device can implement a content player to access a content stream using a network interface, the content stream comprising encrypted content and an embedded license comprising a content key encrypted according to a global key accessible by the content player. The content player determines whether a token meeting an authorization condition is present and uses the global key to decrypt the content key only if such a token is present. The authorization condition may be evaluated at least in part based on data included in the content stream. The authorization condition can include presence of a token having a content ID matching a corresponding ID in the license; presence of a token with a correct device ID; presence of a token signed according to a digital signature identified in the licenses; and/or presence of a token that is unexpired, with expiration evaluated based on a time-to-live indicator in the token.

Подробнее
19-07-2012 дата публикации

Protecting Codes, Keys and User Credentials with Identity and Patterns

Номер: US20120185698A1
Автор: Michael Stephen Fiske
Принадлежит: Individual

Computer security applications use cryptography keys, cryptography codes—such as one-time passcodes—and other user credentials to protect the secrecy, authenticity and integrity of applications such as financial information, financial transactions and infrastructure (e.g. the electrical grid, power plants, and defense systems). The prior art attempted to generate (e.g. derive) an invariant from a biometric template, biometric print or non-biometric pattern that is used as a security key or code. Biometric variability has been a difficult obstacle for the prior art. In an embodiment, the invariant is at least partially generated (e.g., derived) a transformation between the biometric templates or prints. In an embodiment, the invariant is a cryptography key. In an embodiment, the transformation(s) help perform an authentication of the user and are executed by digital computer program instructions. In an embodiment, pattern transformation(s) are represented with colors, geometry or frequencies.

Подробнее
26-07-2012 дата публикации

Methods And Apparatus For Protecting Digital Content

Номер: US20120189117A1
Принадлежит: Individual

A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to receive a digital certificate from a presentation device. The processing system then uses public key infrastructure (PKI) to determine whether the presentation device has been authorized by a certificate authority (CA) to receive protected content. The processing system may also generate a session key and use the session key to encrypt data. The processing system may transmit the encrypted data to the presentation device only if the presentation device has been authorized by the CA to receive protected content. Presentation devices and repeaters may perform corresponding operations, thereby allowing content to be transmitted and presented in a protected manner. Other embodiments are described and claimed.

Подробнее
26-07-2012 дата публикации

Secure transaction facilitator

Номер: US20120191977A1
Принадлежит: MERQUERY FINANCIAL SYSTEMS LLC

A method, system, and devices are provided in which modified digital signatures are used to provide a dynamically generated number suitable for use in transactions requiring validation. The method uses symmetric key encryption to encode a message comprising authorization information and may use compression algorithms to provide a truncated message digest such that the dynamic number may be processed by existing credit card or other authorization systems. In part, this method is an improvement over other validation methods as decryption, which requires greater computing power, is not required. The method may be performed through the use of various devices. For example, credit cards may utilize the method to dispose the dynamic number in a magnetic strip or to transmit the dynamic number via radio transmitter. Smart cards, smart phones, or USB devices, optionally may be utilized to perform the inventive method.

Подробнее
02-08-2012 дата публикации

Location verification in quantum communications

Номер: US20120195597A1
Принадлежит: Individual

Methods and systems for verifying the location of a communication transceiver using quantum communication channels are described. Communications transceivers at different known locations are used having a secure channel therebetween to verify the location of the communication transceiver at a location to be verified using entangled particles transmitted using the quantum communication channels.

Подробнее
02-08-2012 дата публикации

IP Multimedia Security

Номер: US20120198527A1
Принадлежит: Individual

A method of establishing keys for at least partially securing media plane data exchanged between first and second end users via respective first and second media plane network nodes. The method comprises sending session set-up signalling from said first end point towards said second end point, said session set-up signalling including a session key generated by said first end point. The set-up signalling is intercepted at a first signalling plane network node and a determination made as to whether or not a signalling plane key has already been established for securing the signalling plane between said first end point and said first signalling plane network node. If a signalling plane key has already been established, then a media plane key is derived from that signalling plane key, and the media plane key sent to said first media plane network node for securing the media plane between said first end user and said first media plane network node. If a signalling plane key has not already been established, then an alternative media plane key is derived from said session key and sent to said first media plane network node for securing the media plane between said first end user and said first media plane network node.

Подробнее
02-08-2012 дата публикации

Digital works having usage rights and method for creating the same

Номер: US20120198563A1
Принадлежит: Contentguard Holdings Inc

Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party.

Подробнее
02-08-2012 дата публикации

Digital works having usage rights and method for creating the same

Номер: US20120198567A1
Принадлежит: Contentguard Holdings Inc

Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party.

Подробнее
09-08-2012 дата публикации

Method and apparatus for protecting security parameters used by a security module

Номер: US20120201379A1
Принадлежит: Motorola Solutions Inc

A security module includes non-volatile memory, a key protection key generator, and volatile memory. The security module performs a method for protecting security parameters that includes: storing a secret key in the non-volatile memory, wherein the secret key is unique to the security module; applying a key split algorithm to a plurality of key split components to generate a key protection key, wherein the plurality of key split components includes the secret key; decrypting an encrypted first key using the key protection key; performing at least one of media encryption or media decryption using the decrypted first key; storing the key protection key and the decrypted first key in volatile memory.

Подробнее
09-08-2012 дата публикации

Digital rights management of captured content based on capture associated locations

Номер: US20120201418A1
Принадлежит: International Business Machines Corp

A certification is received from a user stating that captured content does not comprise a particular restricted element and a request from the user for an adjustment of a digital rights management rule identified for the captured content based on the captured content comprising the particular restricted element. At least one term of the digital rights management rule is adjusted to reflect that the captured content does not comprise the particular restricted element. The usage of the captured content by the user is monitored to determine whether the usage matches the certification statement.

Подробнее
16-08-2012 дата публикации

Method for Obtaining Information of Key Management Server, and Method, System and Device for Monitoring

Номер: US20120207284A1
Принадлежит: ZTE Corp

The present invention discloses a method for obtaining key management server information, and an intercepting method, system and device, including: in the process of a user equipment registering an IP multimedia subsystem (IMS), storing the KMS information corresponding to the user equipment in a preset IMS core network network element; and when a lawful intercepting device monitors a session initiated by the user equipment, intercepting a session request signaling sent by the user equipment, and obtaining an identification information of the user equipment from the session request signaling, and searching the KMS information corresponding to the user equipment from the preset IMS core network network element according to the identification information of the user equipment. The technical solution of the present invention makes the requirement of lawful intercepting be met without depending on security of the signaling plane when a plurality of KMSs are deployed in the IP multimedia subsystem.

Подробнее
16-08-2012 дата публикации

Secure method of synchronizing cache contents of a mobile browser with a server

Номер: US20120210131A1
Принадлежит: Research in Motion Ltd

A method of securely synchronizing cache contents of a mobile browser with a server includes initiating a session between the browser and server, including transmission of browser state information regarding the cache contents and an authentication key to the server; maintaining a record of data sent from the server to the browser for storage in the cache; maintaining a record of the state information regarding the cache contents transmitted from the browser to the server; and transmitting data requests from the browser to the server, in response to which the server uses the key as a seed generation function and accesses each the record of data and returns only data that does not already form part of the cache contents, and wherein the data includes a result of a hash of data generated by the generation function for authentication by the browser before updating the cache contents with the data.

Подробнее
16-08-2012 дата публикации

Method of securing communication

Номер: US20120210134A1
Автор: Navroop Mitter
Принадлежит: Individual

A method for securing data to be transmitted between a plurality of devices which includes exchanging encryption keys between first and second devices of the plurality of devices, selecting digital rights management (DRM) features for the data which is to be transmitted from the first device, encrypting the data to be transmitted and the selected digital rights management features using at least one distinct key, transmitting the encrypted data and the selected DRM features to the second device and a third device, and decrypting the encrypted data on the second device using the exchanged encryption keys and displaying the data according to the selected DRM features.

Подробнее
23-08-2012 дата публикации

Systems and methods for device and data authentication

Номер: US20120213361A1
Принадлежит: INFINEON TECHNOLOGIES AG

Embodiments relate to systems and methods for authenticating devices and securing data. In embodiments, a session key for securing data between two devices can be derived as a byproduct of a challenge-response protocol for authenticating one or both of the devices.

Подробнее
23-08-2012 дата публикации

Authentication and data integrity protection of a token

Номер: US20120213368A1
Автор: Rainer Falk
Принадлежит: SIEMENS AG

In deriving a cryptographic key from the response message in a challenge-response message in a challenge-response authentication, the related response is calculated after receiving a challenge message which has not yet been transferred. A cryptographic key is derived from the response, which is used to determine a cryptographic check sum of data. The cryptographic check sum is transferred in a first time period after receiving the challenge message. The response message is transferred during a later, second time period. The duration of validity of the key derived from the response message ends before the response message is transferred. A theoretical attacker who can overhear and manipulate the communication will not know the response message until a point in time when the cryptographic key which can be derived therefrom is already no longer valid.

Подробнее
23-08-2012 дата публикации

Biologic-biometrics snapshot profile PIN access system

Номер: US20120215698A1
Автор: Robert Brown, Jr.
Принадлежит: Individual

The present biologic biometrics combination snapshot profile PIN access system is a global healthcare intervention invention for eliminating or reducing the decades of fear and risk for a doctor, or native or foreigner living in any local area, generally traveling, or a tourist within or outside of any city, state, or country have of being sick or injured and unable to speak or unconscious for a medical doctor under pressure for not having an opportunity provided for previewing the person or patient medical record or medical history in advance of administering medicine or performing operating procedure, that also can be used for reducing medical mal-practice, lowering medical mal-practice insurance costs, and decreasing medical mal-practice lawsuits, and also for other forms of life. The method includes obtaining the biologic biometrics combination snapshot profile representing the person or patient with access using PIN assignment 365 days per year, 24 hours per day anywhere on earth that also can be used in space.

Подробнее
30-08-2012 дата публикации

Cryptographic sanction server and methods for use therewith

Номер: US20120221846A1
Принадлежит: ViXS Systems Inc

A sanction server includes a network interface that receives a request for media content from a client device and transmits first sanction data to a caching server and second sanction data to the client device. A sanction processing module generates the first sanction data based on a random number and generates the second sanction data based on the random number. The caching server generates first cryptographic data based on the first sanction data and sends the first cryptographic data to the client device. The client device generates second cryptographic data based on the first sanction data and sends the second cryptographic data to the caching server. The caching server generates a scrambling control word based on the first sanction data and the second cryptographic data. The client device generates the scrambling control word based on the second sanction data and the first cryptographic data.

Подробнее
06-09-2012 дата публикации

Systems, methods, and computer program products for secure multi-enterprise storage

Номер: US20120226722A1
Принадлежит: International Business Machines Corp

In one embodiment, a system includes logic adapted for: receiving data identifiers (IDs), each associated with a file, from multiple data providers, storing the data IDs to a database, identifying any duplicate data IDs in the database to determine if any of the files associated with the data IDs are non-confidential, querying the data providers which provided the file having the duplicate data ID to determine if the data provider wants to store the file to a storage network, such as a cloud storage network, receiving a response from the data provider indicating whether or not to store the file to the storage network, receiving the file from the data provider, storing the file to a storage network, and causing deletion of the file from a system of the data provider. In other embodiments, computer program products are presented for storing data to a storage network.

Подробнее
06-09-2012 дата публикации

Secure platform voucher service for software components within an execution environment

Номер: US20120226903A1
Принадлежит: Individual

Apparatuses, articles, methods, and systems for secure platform voucher service for software within an execution environment. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by authenticated, authorized and verified software components. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy to receive verification for any component. The verification or voucher helps assure to the remote entity that no malware running in the platform or on the network will have access to provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the software component.

Подробнее
13-09-2012 дата публикации

Distribution of Credentials

Номер: US20120233465A1
Принадлежит: International Business Machines Corp

The invention relates to a method for distribution of a set of credentials from a credential issuer to a credential user. The credential user is provided with a user device. A first channel and a second channel are provided for communication between the user device and the credential issuer. A shared key is distributed between the user device and the credential issuer by means of the second channel. A binary representation of the set of credentials with a predefined maximum level of deviation from a uniform distribution is generated. The binary representation of the set of credentials is encrypted by means of the shared key. The encrypted set of credentials is distributed via the first channel from the credential issuer to the user device. The encrypted set of credentials is decrypted by the user device by means of the shared key.

Подробнее
20-09-2012 дата публикации

Virtual account based new digital cash protocols

Номер: US20120239580A1

Virtual account based digital cash protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the virtual account based digital cash protocols provide strong protection of the user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes. The protocols use public key protocols, digital signatures and symmetric key protocols, which may be readily implemented in standard information security based systems based on cryptographic constructs. In addition, the protocols may be deployed in mobile, off-line, and on-line settings.

Подробнее
20-09-2012 дата публикации

Creation of user digital certificate for portable consumer payment device

Номер: US20120239934A1
Автор: Terence V. Trench
Принадлежит: Individual

A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate authority is described. The registration authority, typically a large financial or credit institution, has already performed the initial overhead steps necessary for a digital authentication system using a chip card. These steps include minting and distributing the chip card, establishing that the key pair and card are given to the right person, and creating the certificate library. The reliant party leverages this cryptographic infrastructure to issue its own digital certificate and certificate chain to a user already having a chip card from the registration authority. Consequently, a user can have additional digital certificates issued to him and stored at a user-specific memory in a remote certificate library without having the chip card modified.

Подробнее
27-09-2012 дата публикации

Encryption information transmitting terminal

Номер: US20120246473A1
Принадлежит: Toshiba Corp

The communication unit transmits and receives a communication message. The authentication processor performs an authentication process for establishing the network connection by transmitting and receiving an authentication message to and from an authentication server through the communication unit. The encryption information generator generates an encryption key shared with the authentication server when the authentication process is successfully completed. The first message generator generates a first communication message instructing the destination device to acquire the encryption key from the authentication server. The second message generator generates a second communication message including data to be transmitted to the destination device. The communication unit transmits the first communication message to the destination device, encrypts the second communication message with the encryption key, and transmits an encrypted second communication message to the destination device.

Подробнее
27-09-2012 дата публикации

Method for Validating a Road Traffic Control Transaction

Номер: US20120246477A1
Автор: Albert Hafenscher
Принадлежит: KAPSCH TRAFFICCOM AG

A method for validating a road traffic control transaction. The method includes: storing a cryptographic key assigned to a transaction receiver, in the transaction receiver; recording an image of a vehicle; reading an identification of the vehicle in the recorded image by OCR and generating a control transaction thereof in the control station; generating a random key and encrypting the recorded image into authentication data with the random key and the cryptographic key in the control station; transmitting the recorded image, the control transaction, the random key and the authentication data to the transaction receiver; in the transaction receiver, encrypting the received recorded image into nominal authentication data with the received random key and the stored cryptographic key; and comparing the received authentication data with the nominal authentication data. The received control transaction is then validated when the received authentication data and the nominal authentication data are identical.

Подробнее
04-10-2012 дата публикации

Information processing apparatus and program product

Номер: US20120250867A1
Принадлежит: Toshiba Corp

According to one embodiment, an information processing apparatus, which is connected to an external apparatus, includes a device key storage unit, a creating unit, a calculating unit, a communication unit, and a key calculating unit. The device key storage unit stores therein a device key. The creating unit creates a media key from the device key and a media key block. The calculating unit calculates first output information on the basis of first inherent information inherent to the information processing apparatus and public information. The communication unit transmits the first output information to the external apparatus and receives second output information calculated by the external apparatus from the external apparatus. The key calculating unit calculates a shared key shared between the information processing apparatus and the external apparatus on the basis of the media key, the first inherent information, and the second output information.

Подробнее
04-10-2012 дата публикации

Appending data to existing data stored in a dispersed storage network

Номер: US20120254688A1
Автор: Jason K. Resch
Принадлежит: Cleversafe Inc

A method begins by a processing module receiving a request to store data in dispersed storage network (DSN) memory and determining whether the data is to be appended to existing data. When the data is to be appended, the method continues with the processing module encoding, using an append dispersed storage error coding function, the data to produce a set of encoded append data slices, generating a set of append commands, wherein an append command of the set of append commands includes an encoded append data slice of the set of encoded append data slices and identity of one of a set of dispersed storage (DS) units, and outputting at least a write threshold number of the set of append commands to at least a write threshold number of the set of DS units.

Подробнее
11-10-2012 дата публикации

Methods and systems for re-securing a compromised channel in a satellite signal distribution environment

Номер: US20120257748A1
Принадлежит: BCE Inc

A method implemented by a set top box that encrypts communications for a channel stacking switch (CS) using a public key of the CSS, the method comprising: obtaining a message from a head end; extracting electronic counter measure (ECM) data from the message; sending the ECM data to the CSS; receiving, in response to the sending, a new public key of the CSS; encrypting communications for the CSS using the new public key of the CSS. Also, a method for implementation by a CSS, comprising: maintaining a private key and a public key; obtaining ECM data sent by a set top box in communication with the CSS; obtaining an identifier of the CSS; formulating a new public key based on the private key, the identifier and the ECM; rendering the new public key available to the set top box.

Подробнее
11-10-2012 дата публикации

Public Key Encryption with Digital Signature Scheme

Номер: US20120257752A1
Автор: Herb A. Little
Принадлежит: Research in Motion Ltd

An improved encryption and digital signature system and method in accordance with the invention reuses an encryption ephemeral key pair from an encryption process in a digital signature process. The reuse of the encryption ephemeral key pair in the digital signature process advantageously results in reduced byte size of the digital signature and reduction of costly computation overhead. In a preferred embodiment, the invention is based on the El Gamal encryption scheme and the Nyberg-Rueppel signature scheme. The present invention is particularly useful for operation in conjunction with small communication devices having limited processing and storage, wherein such devices may communicate via bandwidth sensitive RF links.

Подробнее
11-10-2012 дата публикации

Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method

Номер: US20120257754A1
Автор: Toru Nagara
Принадлежит: Sony Corp

The present invention provides a data transmitting apparatus in which a device information obtaining unit obtains device information of a device connected to the data transmitting apparatus; a verification unit verifies validity of a data receiving apparatus, based on the device information obtained by the device information obtaining unit; and a control unit performs control as to whether to obtain the device information through a wireless communication unit or obtain the device information through a wire communication unit, and as to whether to transmit image information encrypted by a first encryption unit from the wireless communication unit or transmit image information encrypted by a second encryption unit from the wire communication unit when the verification unit verifies that the data receiving apparatus is authorized.

Подробнее
11-10-2012 дата публикации

Methods and Apparatus for Authenticating Data as Originating from a Storage and Processing Device and for Securing Software and Data Stored on the Storage and Processing Device

Номер: US20120260091A1
Автор: Alberto J. Fernandez
Принадлежит: XTec Inc

Techniques are described for using unique features of a storage medium for authentication of data as originating from the storage medium, and also for installing software and data to a storage medium in a way which inhibits unauthorized copying of the software and data to another storage medium. Cryptoprocessing keys are created using unique features of the storage medium such as location information related to storage of selected elements of a software installation on the storage medium, or alternatively defective block information relating to the storage medium. The cryptoprocessing keys are used to encrypt data for transmission to a remote server. The remote server uses the cryptoprocessing keys to decrypt the data and authenticates the data as having been encrypted with the correct keys.

Подробнее
18-10-2012 дата публикации

High Precision Internet Local Search

Номер: US20120265749A1
Принадлежит: DeCarta LLC

High-precision local search is performed on the Internet. A map image-rendering software provider embeds spatial keys into maps, which are then provided to producers of Internet content such as map providers. For example, a homeowner may post a message on a web bulletin board advertising his house for sale, and including a map showing the location of the house. When a search engine's web crawler encounters a page having a spatial key embedded in an image, the spatial key is indexed with the other content on the page. Because the spatial key identifies a small geographic area, indexing the content with the spatial key allows search queries to be limited by area and still provide useful results. Thus, a user of a search engine searching for “house for sale” in a specific area will be directed to web pages that meet the geographic and content search terms.

Подробнее
18-10-2012 дата публикации

Method and system for encrypting data delivered over a network

Номер: US20120265986A1
Автор: Arthur G. Esclamada
Принадлежит: Adknowledge Inc

Systems and methods are provided for delivering e-mail, typically with time relevant content, to users, whose e-mail addresses are encrypted. Specifically, the e-mails are administered by a host or home server that is transparent to the e-mail addresses of the computers and e-mail clients, that electronic communications are being sent to and received from.

Подробнее
18-10-2012 дата публикации

Exploiting Application Characteristics for Multiple-Authenticator Broadcast Authentication Schemes

Номер: US20120265995A1
Принадлежит: GM GLOBAL TECHNOLOGY OPERATIONS LLC

A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a heavyweight signature corresponding to the predicted value, and obtaining an actual value for the vehicle parameter. The method also includes the computer comparing the predicted value to the actual value to determine if the predicted value bears a first relationship to the actual value. If the computer determines that the predicted value bears the relationship to the actual value, the on-board computer generates a lightweight authenticating signature to correspond to the predicted value and broadcasts a data message having the predicted value with the corresponding heavyweight authenticating signature and the corresponding lightweight authenticating signature.

Подробнее
25-10-2012 дата публикации

Authentication Device and Authentication Method for Portable Information Terminal

Номер: US20120268248A1
Автор: Yoshifumi HIRAIDE
Принадлежит: Shinten Sangyo Co Ltd

A portable information terminal such as a cellular phone terminal, a tablet type terminal, or an electronic book reader is set to be used only by an identical user. A touch panel type operation panel capable of using a touch panel mode and a fingerprint sensor mode as a common mode is disposed at a portable information terminal. A fingerprint sensing function is incorporated for performing authentication of a user's fingerprint and the fingerprint sensor mode and the touch panel mode can be used as a common mode. The operation panel is configured to display a fingerprint sensor portion 12 at a predetermined position as being in the fingerprint sensor mode when the portable information terminal is turned on, and then fingerprint authentication is performed by obtaining fingerprint information when pressing operation is performed on the fingerprint sensor portion for a predetermined time.

Подробнее
25-10-2012 дата публикации

Multi-Factor Authentication Using A Smartcard

Номер: US20120272307A1
Автор: Mark Buer
Принадлежит: Broadcom Corp

Methods and systems are provided for non-cryptographic capabilities of a token such as a smartcard to be used as an additional authentication factor when multi-factor authentication is required. Smartcards are configured to generate a transaction code each time a transaction is attempted by the smartcard. The transaction code is dynamic, changing with each transaction, and therefore is used as a one-time password. When a user attempts to access a service or application requiring at least two authentication factors, a secure processor is used to read transaction code from the smartcard. The secure processor establishes a secure communication with the remote computer hosting the service or application. The transaction code can then be encrypted prior to transmission over the public Internet, providing an additional layer of security.

Подробнее
01-11-2012 дата публикации

Cryptographically secure authentication device, system and method

Номер: US20120275595A1
Автор: Glenn A. Emelko
Принадлежит: Aclara RF Systems Inc

An electronic device generates identifying values which are used in authenticating the electronic device. The device comprises an interface, a private key generator for generating a private key, a non-volatile memory for storing at least the private key, an index source, a hash engine, and a logical interconnection between the private key generator, the non-volatile memory, the index source, the hash engine and the interface. The hash engine generates identifying values provided to the interface via the logical interconnection. The identifying values are provided to a verifying device for use in authenticating the electronic device. Alternatively or in addition, devices may be paired to share a root key to cryptographically communicate between each other and/or to authenticate each other.

Подробнее
08-11-2012 дата публикации

Method and System for Enhancing Crytographic Capabilities of a Wireless Device Using Broadcasted Random Noise

Номер: US20120281831A1
Принадлежит: Individual

A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.

Подробнее
08-11-2012 дата публикации

Method for facilitating access to a first access nework of a wireless communication system, wireless communication device, and wireless communication system

Номер: US20120284785A1
Принадлежит: MOTOROLA MOBILITY LLC

A method for facilitating access to a first access network ( 110 ) of a wireless communication system ( 100 ) comprises authenticating ( 300 ) a wireless communication device ( 102 ) with a second access network ( 104 ) and generating temporary access credentials using access information provided by the second access network ( 104 ). The wireless communication device ( 102 ) then transforms ( 302 ) the temporary access credentials and an identifier of the first access network ( 110 ) to provide first transformed access credentials which are transmitted ( 304 ) for performing authentication with the first access network ( 110 ). The identifier of the first access network ( 110 ) is provided to the second access network ( 104 ) which generates ( 308 ) second transformed access credentials using the identifier of the first access network ( 110 ) and the temporary access credentials. Authentication is performed ( 310 ) with the first access network ( 110 ), which includes comparing the first transformed access credentials with the second transformed access credentials and allowing access to the first access network ( 110 ) when the first transformed access credentials and the second transformed access credentials are substantially the same. A wireless communication device, and a wireless communication system are also disclosed and claimed.

Подробнее
15-11-2012 дата публикации

Transponder, Reader and Methods for Operating the Same

Номер: US20120288093A1
Автор: Bruce Murray
Принадлежит: NXP BV

It is described a method for operating a transponder ( 203 ), the method comprising: receiving, by the transponder, in particular wirelessly, transmitted reader data ( 205 ) representing x and sqrt[b]/x, wherein x is an element of a binary Galois field and b is a scalar; processing, by the transponder, the reader data ( 205 ) to determine, whether x is a first coordinate of a point on an elliptic curve defined by the elliptic curve equation y 2 +xy=x 3 +ax 2 +b, wherein the elliptic curve is defined over the Galois field such that x and y are elements of the Galois field, wherein y is a second coordinate of the point on the elliptic curve. Further a transponder, a method for operating a reader and a reader are described.

Подробнее
22-11-2012 дата публикации

Enabling use of a certificate stored in a smart card

Номер: US20120297195A1
Принадлежит: Research in Motion Ltd

If a smart card is to be used for a particular purpose, and there is no certificate initialized on the smart card for this purpose, a computerized device enables a user to select one of the certificates already installed in the smart card for the particular purpose. The selected certificate may be imported into the computerized device.

Подробнее
29-11-2012 дата публикации

System and methods for permitting open access to data objects and for securing data within the data objects

Номер: US20120300928A1
Принадлежит: Blue Spike Inc

A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of ( 1 ) providing a data object comprising digital data and file format information; ( 2 ) embedding independent data into a data object; and ( 3 ) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data.

Подробнее
29-11-2012 дата публикации

Systems and Methods for Encrypting Mobile Device Communications

Номер: US20120300932A1
Принадлежит: First Data Corp

Embodiments of the invention can provide systems and methods for encrypting mobile device communications. According to one example embodiment of the invention, a method for encrypting mobile device communications is provided. The method can include generating, by a first application stored on a first memory of a mobile device, a message to be communicated to an intended recipient; providing, by the first application to an authentication application stored on a second memory of the mobile device, the message; encrypting, by the authentication application, the message; providing, by the authentication application to the first application, the encrypted message; and directing, by the first application, communication of the message to the intended recipient.

Подробнее
29-11-2012 дата публикации

Arranging data ciphering in a wireless telecommunication system

Номер: US20120300934A1
Принадлежит: Individual

Arranging data ciphering in a telecommunication system comprising at least one wireless terminal, a wireless local area network and a public land mobile network. At least one first ciphering key according to the mobile network is calculated in the mobile network and in the terminal for a terminal identifier using a specific secret key for the identifier. Data transmission between the mobile network and the terminal is carried out through the wireless local area network. A second ciphering key is calculated in the terminal and in the mobile network using said at least one first ciphering key. The second ciphering key is sent from the mobile network to the wireless local area network. The data between the terminal and the network is ciphered using said second ciphering key.

Подробнее
29-11-2012 дата публикации

Systems and Methods for Authenticating Mobile Devices

Номер: US20120303961A1
Принадлежит: First Data Corp

Embodiments of the invention provide systems and methods for authenticating mobile devices. A registration request and identifying information for a mobile device or a secure element associated with the mobile device may be received. Based upon the received identifying information and a base level key, a rotated key for the mobile device may be determined. The determined rotated key may then be provided to the mobile device, and the rotated key may be utilized for subsequent authentication of the mobile device.

Подробнее
29-11-2012 дата публикации

Method and system for business workflow cycle of a composite document

Номер: US20120303968A1
Принадлежит: Hewlett Packard Development Co LP

A method and system for a business workflow of a composite document are described. An integrity and authenticity of an entry table are identified and verified using a verification key, a map file corresponding to entries in the table are identified using a private user decryption key, signature verification keys and access keys are read from the map file, and authenticity of the map file and the document parts are verified. Following verification, content is delivered to a user for review, update and/or modification of the content, and then is encrypted, signed, and moved along the workflow, normally to the next workflow participant. A secure distribution version of a composite document is created from a master copy by creating a serialization including at least one part of a composite document and at least one user, creating a table listing document parts and associated users, generating encryption and decryption keys, encrypting document parts, applying signatures to encrypted document parts, updating the tables with the signed parts and updating the composite document with the updated tables. A master copy is updated from a secure distribution copy after the distribution copy has completed a workflow and a workflow wrap.

Подробнее
06-12-2012 дата публикации

Method for protecting application and method for executing application using the same

Номер: US20120311720A1
Принадлежит: SAMSUNG ELECTRONICS CO LTD

An application protection method and an application execution method using the same are provided. The application protection method generates a key needed to execute the application which is provided to a user terminal using information on the user terminal, information on the application, and a part of text; and transmits the generated key to the user terminal. Therefore, the application is executed on the device which has a legal right for the application, thereby preventing the illegal use of the application.

Подробнее
13-12-2012 дата публикации

System And Method For Wireless Re-Programming Of Memory In A Communication System

Номер: US20120313744A1
Принадлежит: Johnson Controls Technology Co

The invention relates to a system and method of re-programming memory, and in particular, to wirelessly re-programming software, such as the application code, residing in memory of a trainable transceiver. The wireless re-programming of memory allows for software in the trainable transceiver to be updated or replaced from a remote location, where a direct or wired connection to the product is not otherwise available.

Подробнее