Using Master Key (e.g., Key-encrypting-key) Patents (Class 380/281)
  • Patent number: 8788807
    Abstract: Methods and apparatus for protecting user privacy in a shared key system. According to one aspect, a user generates a derived identity based on a key and a session variable, and sends the derived identity to an application. In one embodiment, a key server may be used to receive the derived identity from the application, and return a sub-key to the application to use for encrypting communications with the user.
    Type: Grant
    Filed: January 10, 2007
    Date of Patent: July 22, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Adrian Escott, James Semple
  • Patent number: 8782803
    Abstract: A derivative work is encrypted using a cipher created from digital sources used to create the derivative work. A software application made available for download permits a mix artist to generate a derivative-encrypted work from a derivative work that the mix artist has created using one or more of the digital sources. The derivative-encrypted work is streamed to a worldwide web server, where it is made available for download by consumers for a fee. The software application is also available for download by the consumers and permits the consumers to purchase and download any available derivative-encrypted work. However, the derivative-encrypted works can only be decrypted if the consumer has possession of a digital source for each of the source art works associated with the digital sources used to create the derivative work.
    Type: Grant
    Filed: April 14, 2010
    Date of Patent: July 15, 2014
    Assignee: Legitmix, Inc.
    Inventors: Omid Allen McDonald, David Ross McDonald
  • Patent number: 8781132
    Abstract: Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.
    Type: Grant
    Filed: November 16, 2012
    Date of Patent: July 15, 2014
    Assignee: Motorola Solutions, Inc.
    Inventors: Chris A. Kruegel, Thomas J. Senese, Hans C. Sowa
  • Patent number: 8775794
    Abstract: Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a user password from a user; (2) using the computer processor, the application combining the user password and a password extension; (3) using the computer processor, the application cryptographically processing the combined user password and password extension, resulting cryptographic public information; and (4) providing the cryptographic public information to a server. The user password is not provided to the server. In another embodiment, a method for user authentication includes (1) using a computer processor, receiving a login page from a server; (2) sending a Hash-based Message Authentication Code to the server; and (3) receiving an authentication from the server. In one embodiment, the login page may include a transkey and a value B.
    Type: Grant
    Filed: June 24, 2011
    Date of Patent: July 8, 2014
    Assignee: JPMorgan Chase Bank, N.A.
    Inventor: Glenn Benson
  • Patent number: 8768849
    Abstract: Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM provision apparatus includes a content download unit which downloads encrypted real content and dummy content from a download server and which manages the downloaded real content and dummy content; a license management unit which manages a license issued by a license server; and a processing unit which manages the downloaded real content and dummy content and the issued license.
    Type: Grant
    Filed: November 30, 2009
    Date of Patent: July 1, 2014
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Nam-Geol Lee, Hyung-Chan Kim, Gyu-Baek Kim
  • Patent number: 8763156
    Abstract: There is provided a system and method for a digital receipt for use with an interoperable keychest. There is provided a method for online registration of a digital receipt associated with a content, comprising performing a transaction to obtain from a first distributor the content encrypted by a title key and a first digital rights management (DRM) license usable with the first distributor to access the title key, receiving from the first distributor the digital receipt associated with the content including information relevant to the transaction, and transmitting the digital receipt to the interoperable keychest acting as a central key repository (CKR) for an online registration of the digital receipt associated with the content. Authorized media distributors may then generate new DRM licenses using the CKR, enabling interoperable content playback of the same universal file across different media distributors and clients.
    Type: Grant
    Filed: July 10, 2009
    Date of Patent: June 24, 2014
    Assignee: Disney Enterprises, Inc.
    Inventor: Arnaud Robert
  • Patent number: 8755526
    Abstract: There is provided a system and method for a universal file packager for use with an interoperable key chest. There is provided a method for distributing media contents to distributors, comprising obtaining a first key, a second key and a content, encrypting the second key using the first key to generate an encrypted second key, encrypting the content using the second key to generate an encrypted content, generating a key information file including the encrypted second key, generating a universal file including the encrypted content and a first network address for a central key repository (CKR), providing the key information file for storage in the CKR, and providing the universal file to the distributors. The universal file can then be provided to users for digital e-commerce and transferred across different distributors with the CKR negotiating key access for granting new interoperable DRM licenses.
    Type: Grant
    Filed: July 10, 2009
    Date of Patent: June 17, 2014
    Assignee: Disney Enterprises, Inc.
    Inventors: Arnaud Robert, Scott F. Watson
  • Patent number: 8756439
    Abstract: A non-transient computer usable medium has computer usable instructions embodied thereon, the computer usable instructions configured to cause a computer device to perform the steps of receiving an intermediate program code prior to execution of the intermediate program code; recognizing data storage commands within the intermediate program code; modifying the intermediate program code such that, during execution of the intermediate program code, the data is encrypted before it is stored; recognizing data retrieval commands within the intermediate program code; modifying the intermediate program code such that, during execution of the intermediate program code, the data is decrypted after it is retrieved; and providing the modified intermediate program code for execution.
    Type: Grant
    Filed: August 30, 2010
    Date of Patent: June 17, 2014
    Assignee: Physical Optics Corporation
    Inventors: Tomasz Jannson, Thomas Forrester, Kevin Duane Degrood, Kathy Mai Nguyen, Andrew Kostrzewski, Kang Lee, Eric Gans, Kevin Carl Walter
  • Patent number: 8755527
    Abstract: A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to management of the key material populating one or more key management fields that define attributes that limit distribution of the key material.
    Type: Grant
    Filed: May 4, 2011
    Date of Patent: June 17, 2014
    Assignee: International Business Machines Corporation
    Inventors: Todd W. Arnold, Elizabeth A. Dames, Carsten D. Frehr, Michael J. Kelly, Kenneth B. Kerr, Richard V. Kisley, Eric D. Rossman, Eric B. Smith
  • Patent number: 8755528
    Abstract: A method and system for establishing a secure connection between stations are disclosed. The method includes that: 1) a switch device receives an inter-station key request packet sent by a first user terminal; 2) the switch device generates an inter-station key, constructs an inter-station key announcement packet and sends it to a second user terminal; 3) the switch device receives an inter-station key announcement response packet sent by the second user terminal; 4) the switch device constructs an inter-station key announcement response packet and sends it to the first user terminal; 5) the switch device receives an inter-station key announcement response packet sent by the first user terminal. The switch device establishes an inter-station key for the two stations which are connected to the switch device directly, by which the embodiments of the present invention ensure the confidentiality and integrality of user data between the stations.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: June 17, 2014
    Assignee: China Iwncomm Co., Ltd.
    Inventors: Li Ge, Jun Cao, Manxia Tie, Qin Li, Xiaolong Lai
  • Patent number: 8745415
    Abstract: A system, method, and computer-readable storage medium for protecting a set of storage devices using a secret sharing scheme. The data of each storage device is encrypted with a key, and the key is encrypted based on a shared secret and a device-specific value. Each storage device stores a share and its encrypted key, and if a number of storage devices above a threshold are available, then the shared secret can be reconstructed from the shares and used to decrypt the encrypted keys. Otherwise, the secret cannot be reconstructed if less than the threshold number of storage devices are accessible, and then data on the storage devices will be unreadable.
    Type: Grant
    Filed: September 26, 2012
    Date of Patent: June 3, 2014
    Assignee: Pure Storage, Inc.
    Inventors: Ethan Miller, John Colgrove, John Hayes
  • Patent number: 8738911
    Abstract: A method for managing keystore information on a computing device may include requesting a keystore from a distribution system, receiving the keystore from the distribution system, and populating a runtime environment with keystore information contained within the keystore. A method for generating a keystore may include receiving, by a distribution system, a request for a keystore from a computing device, generating a key pair including a public key and a private key, generating a certificate signing request, digitally signing the public key with the private key, generating the keystore, combining the signed public key with the private key in the keystore, and providing the keystore to the computing device. A method for generating a truststore may include receiving, by a distribution system, a request for a truststore from a computing device, generating the truststore, adding a certificate to the truststore, and providing the truststore to the computing device.
    Type: Grant
    Filed: June 25, 2012
    Date of Patent: May 27, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Andrew Schiefelbein
  • Publication number: 20140140514
    Abstract: A method includes encrypting information in accordance with an encryption scheme that uses a public key; encrypting a plurality of instances of a secret key, each being encrypted using at least one additional instance of the public key; sending the encrypted information and the plurality of encrypted instances of the secret key to a destination; receiving an encrypted result from the destination; and decrypting the encrypted result. A further method includes receiving a plurality of encrypted secret keys and information descriptive of a function to be performed on data; converting the information to a circuit configured to perform the function on the data; and applying the data to inputs of the circuit and evaluating the data using, in turn, the plurality of encrypted secret keys.
    Type: Application
    Filed: December 5, 2013
    Publication date: May 22, 2014
    Applicant: International Business Machines Corporation
    Inventor: Craig B. Gentry
  • Patent number: 8732423
    Abstract: A network memory system is disclosed. The network memory system comprises a first appliance configured to encrypt first data, store the encrypted first data in a first memory device. The first appliance also determines whether the encrypted first data exists in a second appliance and transmits a store instruction comprising the encrypted first data based on the determination that the encrypted first data does not exist in the second appliance. The second appliance is configured to receive the store instruction from the first appliance and store the encrypted first data in a second memory device. The second appliance is further configured to receive a retrieve instruction comprising a location indicator indicating where the encrypted first data is stored, process the retrieve instruction to obtain encrypted response data, and decrypt the encrypted response data.
    Type: Grant
    Filed: February 1, 2013
    Date of Patent: May 20, 2014
    Assignee: Silver Peak Systems, Inc.
    Inventor: David Anthony Hughes
  • Patent number: 8712056
    Abstract: Security in a mobile ad hoc network is maintained by using various forms of encryption, various encryption schemes, and various multi-phase keying techniques. In one configuration, an over the air, three-phase, re-keying technique is utilized to ensure that no authorized nodes are lost during re-keying and that nodes that are intended to be excluded from re-keying are excluded. In another configuration, an over the air, two-phase keying technique, is utilized to maintain backwards secrecy.
    Type: Grant
    Filed: June 3, 2010
    Date of Patent: April 29, 2014
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Robert Hall
  • Patent number: 8707450
    Abstract: Methods, apparatuses and storage medium associated digital rights management (DRM) using DRM locker is disclosed herein. In embodiments, a DRM locker is provided to a client device. The DRM locker may be configured to store a number of DRM licenses or keys for a number of DRM protected contents. The DRM locker, on presentation of an associated locker key, may respond to a request for one or more of the stored DRM licenses or keys, to enable consumption of the corresponding DRM protected contents using the client device. Other embodiments may be disclosed or claimed.
    Type: Grant
    Filed: August 3, 2012
    Date of Patent: April 22, 2014
    Assignee: Intel Corporation
    Inventors: Christopher J. McConnell, Uday R. Savagaonkar
  • Patent number: 8681996
    Abstract: A method of asymmetric key wrapping in a system is disclosed. The method generally includes the steps of (A) transferring a shared key from a key storage to a cipher operation, wherein the cipher operation comprises a symmetric-key cipher utilizing a cipher key, (B) generating an encrypted key by encrypting a decrypted key with the cipher operation using the shared key as the cipher key in a wrap-encrypt mode and (C) presenting the encrypted key external to the system in the wrap-encrypt mode.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: March 25, 2014
    Assignee: LSI Corporation
    Inventor: Anton I. Sabev
  • Patent number: 8675878
    Abstract: There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key chest or central key repository (CKR), the method comprising receiving a user request from a user device for access to an encrypted content identified by a content identification, transmitting a key request to the CKR including the content identification, receiving an encrypted first key from the CKR, decrypting the encrypted first key using a second key to retrieve the first key, and providing a DRM license for the encrypted content to the user device using the first key for use by the user device to decrypt the encrypted content using the first key. By generating such DRM licenses, distributors can unlock protected content even sourced from distributors using different DRM schemas.
    Type: Grant
    Filed: April 25, 2013
    Date of Patent: March 18, 2014
    Assignee: Disney Enterprises, Inc.
    Inventors: Arnaud Robert, Scott F. Watson
  • Patent number: 8661248
    Abstract: A method, apparatus, and system for sending and receiving a security policy of multicast sessions are provided. The method for sending the security policy of multicast sessions includes: after a Datagram Transport Layer Security (DTLS) session is set up between a sender and a receiver, receiving a security policy request from the receiver, constructing a security policy response according to a security policy, multiplexing the security policy response and Secure Real-Time Transport Protocol (SRTP) multicast session data, and sending the multiplexed data to the receiver.
    Type: Grant
    Filed: October 30, 2009
    Date of Patent: February 25, 2014
    Assignee: Huawei Technologies Co., Ltd.
    Inventor: Xu Chen
  • Patent number: 8654974
    Abstract: A system for securing information. The system includes a first tracking device associated with an object or an individual. In one embodiment, the first tracking device generates independently a synchronous secret key and a server generates independently the synchronous secret key. Over an insecure communication channel, the server communicates an asynchronous vector pair encrypted with the synchronous secret key with the tracking device. To securely communicate information, messages are encrypted and decrypted using the asynchronous vector pair between the tracking device and the server. To further secure message information, a set of random numbers may be further utilized with the asynchronous vector pair to further encrypt and decrypt the messages communicated between the tracking device and the server.
    Type: Grant
    Filed: October 18, 2007
    Date of Patent: February 18, 2014
    Assignee: Location Based Technologies, Inc.
    Inventors: Roger B. Anderson, Jennifer B. Anderson
  • Patent number: 8654981
    Abstract: A system for processing multimedia channels is described comprising: transmitting decryption keys for decrypting the multimedia channels, the keys encrypted in both a first encryption format and a second encryption format; the keys encrypted in the first encryption format being decryptable by a first type of multimedia receiver; and the keys encrypted in the second encryption format being decryptable by a second type of multimedia receiver.
    Type: Grant
    Filed: December 5, 2008
    Date of Patent: February 18, 2014
    Assignee: AARIS Enterprises, Inc.
    Inventors: William M. Gillon, Stephen G. Perlman
  • Patent number: 8656159
    Abstract: In some embodiments, a method includes receiving a modifiable electronic document. The method includes generating a new version of the modifiable electronic document. The method also includes encrypting the new version of the modifiable electronic document using an encryption key that is used to encrypt the modifiable electronic document and different versions of the modifiable electronic document. The method includes saving the new version of the modifiable electronic document.
    Type: Grant
    Filed: October 11, 2007
    Date of Patent: February 18, 2014
    Assignee: Adobe Systems Incorporated
    Inventor: James Donahue
  • Patent number: 8646054
    Abstract: The present invention provides a bridged, direct-attached storage device that can be secured and work with any host system. In one embodiment, the storage device is configured with a secured user area and an unlocking mechanism for access to the secured user area. The storage device may comprise a translation module having a bridge that presents multiple logical units to a host. In addition, the storage device may comprise a controller having its own encryption engine to encrypt the entire user area of the storage media. In one embodiment, the storage device presents the unlocking mechanism via a second logical device as a read-only device, such as a CD/DVD-ROM, or virtual CD device. The secondary logical device comprises executable code, which allows the user, for example, to enter, change, or remove the password and unlock the user area.
    Type: Grant
    Filed: March 23, 2012
    Date of Patent: February 4, 2014
    Assignee: Western Digital Technologies, Inc.
    Inventors: Christopher P. Karr, John E. Maroney
  • Patent number: 8645687
    Abstract: A digital file is associated with a security attribute in which identification data for a physical key is stored. The digital file content is encrypted, and may not be decrypted by a receiving computer unless a removable physical key that can be associated with the receiving computer includes identification data which matches the identification data stored in the file's security attribute. The digital content encrypted in the file may be compressed, and a portion of the security attribute may also be encrypted. When a portion of the security attribute is encrypted, the receiving computer may decrypt only the encrypted portion of the security attribute unless the identification data of the security attribute matches the identification data of a physical key physically or wirelessly coupled to the receiving computer. Improved security and reduction of pirating of the digital content are therefore provided.
    Type: Grant
    Filed: August 3, 2011
    Date of Patent: February 4, 2014
    Assignee: NBCUniversal Media, LLC
    Inventor: Jeffrey Edward Taylor
  • Patent number: 8638943
    Abstract: A communication device includes an antenna for transmitting and receiving signals with a reader/writer of a service issuing terminal; a recording unit recorded with data, and also recorded with a pattern in which information specifying an authentication key and access attribute indicating whether or not a readout process or a write process on the data is possible using the authentication key are corresponded; and a control unit for, when receiving one or plural information specifying a region of the data from the reader/writer of the service issuing terminal via the antenna, holding the received one or plural information specifying the region of the data.
    Type: Grant
    Filed: April 29, 2009
    Date of Patent: January 28, 2014
    Assignee: Sony Corporation
    Inventors: Toshinori Kanemoto, Teiichi Shiga
  • Patent number: 8638935
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key.
    Type: Grant
    Filed: January 12, 2012
    Date of Patent: January 28, 2014
    Assignee: Apple Inc.
    Inventors: Gianpaolo Fasoli, Augustin J. Farrugia, Bertrand Mollinier Toublet, Gelareh Taban, Nicholas T. Sullivan, Srinivas Vedula
  • Patent number: 8638939
    Abstract: The present disclosure provides for the use of non-alphanumeric, non-biometric inputs to authenticate a user accessing secured data or functions on an electronic device. In one embodiment, an authentication screen is invoked by use of a gesture input via a touch-sensitive structure. In such an embodiment, an authentication screen may be invoked with no outward appearance on the display as to the existence of the data or function for which access is sought. The authentication may be based upon a gesture, a sequence of selected objects, or another non-alphanumeric, non-biometric input.
    Type: Grant
    Filed: August 20, 2009
    Date of Patent: January 28, 2014
    Assignee: Apple Inc.
    Inventors: Brandon J. Casey, Erik Cressall
  • Patent number: 8640210
    Abstract: A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.
    Type: Grant
    Filed: September 1, 2011
    Date of Patent: January 28, 2014
    Assignee: Microsoft Corporation
    Inventors: Mark Novak, Paul J. Leach, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan
  • Patent number: 8640249
    Abstract: Provided is a digital broadcasting conditional access system and method, including a digital broadcasting transmitter and a digital broadcasting receiver. The transmitter scrambles a broadcasting signal using a control key, generates broadcasting viewing restriction information and broadcasting viewing entitlement information, and transmits the scrambled broadcasting signal after incorporating the broadcasting viewing restriction information and broadcasting viewing entitlement information into the scrambled broadcasting signal. The receiver extracts the broadcasting viewing restriction information and the broadcasting viewing entitlement information included in the scrambled broadcasting signal to generate the control key, descrambles the broadcasting signal using the control key, and reproduces the descrambled broadcasting signal. Thus, the system and method can be provided for a digital broadcasting receiver including a smart card.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: January 28, 2014
    Assignee: Samsung Electronics Co., Ltd
    Inventor: Young-Sik Park
  • Patent number: 8630422
    Abstract: A method includes encrypting information in accordance with an encryption scheme that uses a public key; encrypting a plurality of instances of a secret key, each being encrypted using at least one additional instance of the public key; sending the encrypted information and the plurality of encrypted instances of the secret key to a destination; receiving an encrypted result from the destination; and decrypting the encrypted result. A further method includes receiving a plurality of encrypted secret keys and information descriptive of a function to be performed on data; converting the information to a circuit configured to perform the function on the data; and applying the data to inputs of the circuit and evaluating the data using, in turn, the plurality of encrypted secret keys.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: January 14, 2014
    Assignee: International Business Machines Corporation
    Inventor: Craig B. Gentry
  • Patent number: 8630416
    Abstract: Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key for reception may be installed early (i.e., prior to receipt of a rekeying confirmation message). The use of the new key for transmission may be delayed until after receipt of the rekeying confirmation message. The early installation of the new key for reception may allow both the new key and old key to be active at the same time for use decrypting received packets to reduce packet loss during rekeying operations. The rekeying confirmation message may be the fourth message of a four-way handshake for rekeying. In some embodiments, two key identifiers may be alternated between four-way handshakes to prevent deletion of the old key.
    Type: Grant
    Filed: December 21, 2009
    Date of Patent: January 14, 2014
    Assignee: Intel Corporation
    Inventors: Emily H. Qi, Jesse R. Walker, Robert J. Stacey, Herbert Liondas, Marc Jalfon
  • Patent number: 8625800
    Abstract: Transferring control of a secure element between TSMs comprises a zone master key established between the TSMs that facilitates encryption of a temporary key. The TSMs create the zone master key prior to initiation of transfer of control. Once transfer of control is initiated, the first TSM establishes a communication channel and deletes its key from the secure element. The first TSM creates a temporary key that is encrypted with the zone master key established between the first TSM and the second TSM. The encrypted temporary key is communicated to the second TSM with a device identifier. The second TSM decrypts the temporary key using the zone master key and identifies the user device using the device identifier. The new TSM establishes a communication channel and deletes the temporary key from the secure element. The new TSM then inputs and saves its key into the secure element.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: January 7, 2014
    Assignee: Google Inc.
    Inventors: Sarel Kobus Jooste, John Joseph, Shane Alexander Farmer
  • Patent number: 8619994
    Abstract: The present invention relates to a method and system for providing a digital content service that provides packaging content consisting of digital rights management (DRM) content and advertisement content, and is able to use the DRM content for free by watching or listening to the advertisement content, including: generating packaging content consisting of pilot content and target content, which has been encrypted using an encryption key of the pilot content, and providing the packaging content to a portable terminal; and obtaining a decryption key for the target content through playing the pilot content of the packaging content, and playing the target content by the decryption key, by the portable terminal.
    Type: Grant
    Filed: November 25, 2009
    Date of Patent: December 31, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Kyung Keun Lee, Byung Rae Lee, Seong Hun Bang
  • Patent number: 8621595
    Abstract: A method of network gateway authenticating involves a network gateway receiving an authentication request from a communications terminal. The communications terminal is in communication with an identity token. The authentication request includes a token cryptogram generated from a cryptographic key stored on the identity token. The network gateway transmits the authentication request to a communications network, and receives an authentication response from the communications network in accordance with a validity of the token cryptogram. The authentication response includes a gateway authentication certificate. The gateway authentication certificate is configured to authenticate the network gateway to a network device of the communications network.
    Type: Grant
    Filed: March 25, 2013
    Date of Patent: December 31, 2013
    Assignee: The Toronto Dominion Bank
    Inventors: Robert Hayhow, Bryan Michael Gleeson
  • Patent number: 8621243
    Abstract: In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a manner that allows the data to be obtained from the ciphertext only if one or more conditions are satisfied. In accordance with another aspect, a bit string is received from a calling program. Data in the bit string is decrypted using public key decryption and returned to the calling program only if one or more conditions included in the bit string are satisfied.
    Type: Grant
    Filed: January 27, 2011
    Date of Patent: December 31, 2013
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado
  • Patent number: 8619993
    Abstract: A system and method of providing content protection for OMA Broadcast smartcard profiles. When an electronic device has a content item for encryption, the device generates a random number. The electronic device then transmits a content encryption key request message, including the random number and a service encryption key identifier, to a smartcard, which then responds with a a content encryption key response message. The content encryption key response message includes the random number and a content encryption key. The electronic device can then use the content encryption key to manage the encryption of the content item. The electronic device stores random number, service key identifier and encrypted content item into a certain file format. The electronic device sends again content encryption key request at the time of rendering. The content encryption key returned by the content encryption key response message is used for the decryption of the stored content item.
    Type: Grant
    Filed: June 27, 2007
    Date of Patent: December 31, 2013
    Assignee: Nokia Corporation
    Inventor: Sanjeev Verma
  • Patent number: 8615787
    Abstract: This invention provides for a transaction card for use at a terminal and for initiating an internet transaction with a SSL protected server, wherein the card comprises a smartcard including an application arranged for extending an SSL connection from the said protected server into the smartcard and, further, the invention can provide for a related terminal, server and related transaction initiation and establishment methods, for extending the said SSL connection as noted above.
    Type: Grant
    Filed: May 15, 2007
    Date of Patent: December 24, 2013
    Assignee: NXP B.V.
    Inventor: Bruce Murray
  • Patent number: 8612355
    Abstract: Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM provision apparatus includes a content download unit which downloads encrypted real content and dummy content from a download server and which manages the downloaded real content and dummy content; a license management unit which manages a license issued by a license server; and a processing unit which manages the downloaded real content and dummy content and the issued license.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: December 17, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Nam-Geol Lee, Hyung-Chan Kim, Gye-Baek Kim
  • Patent number: 8608064
    Abstract: A payment system and method of IC card and a multi-application IC card as well as payment terminal are proposed in the present invention. The terminal and the IC card perform off-line data authentication using an asymmetric key algorithm during an off-line transaction, and if the transaction is not approved in manner of off-line, the terminal and the IC card performs an on-line transaction via a host. Therefore, the payment system and method of IC card and the multi-application IC card as well as payment terminal disclosed in the present invention can be used both in machinery without on-line transaction environment and in standard merchant machinery with on-line transaction environment.
    Type: Grant
    Filed: August 24, 2010
    Date of Patent: December 17, 2013
    Assignee: China Unionpay Co., Ltd.
    Inventors: Jinyao Xu, Chunhuan Li, Chunye Hui, Jianning Bo, Hongwen Meng, Yanmei Zhou, Denfeng Han
  • Publication number: 20130329890
    Abstract: An offline immobilizer ECU reads an encryption key generation code from an offline additional electronic key and generates an electronic key encryption key for the offline additional electronic key using the encryption key generation code and a communication subject key encryption key held by the immobilizer ECU. The immobilizer ECU stores, in a memory, the generated electronic key encryption key and a key ID code that is read from the offline additional electronic key.
    Type: Application
    Filed: May 28, 2013
    Publication date: December 12, 2013
    Inventors: Daisuke KAWAMURA, Hiroaki IWASHITA, Masaki HAYASHI, Toshihiro NAGAE, Hisashi KATO, Tetsuya EGAWA
  • Patent number: 8607069
    Abstract: A data processing apparatus is disclosed, that comprises a large capacity memory means for storing a plurality of files, a memory means for storing move/copy history when a particular file is moved/copied from the large capacity memory means to a non-volatile memory, a reference means for referencing the history information stored in the memory means when the particular file is moved/copied from the large capacity memory means to the non-volatile memory, and a control means for prohibiting the particular file from being moved/copied from the large capacity memory means to the non-volatile memory when the reference means has detected that the history information is stored in the memory means.
    Type: Grant
    Filed: June 4, 2004
    Date of Patent: December 10, 2013
    Assignee: Sony Corporation
    Inventors: Nobuyuki Kihara, Teppei Yokota
  • Patent number: 8594334
    Abstract: The present invention relates to a key management method to establish selective secret information in multiple disjoint groups, more specifically to a method of reducing the broadcast size in access hierarchies and localize and facilitate management in said access hierarchies. The key management method selects a number of subgroups. Each subgroup supports an instance of a key distribution method for receiving distributed key material, and is capable of computing a usage security key based on the distributed key material and predefined user group key material.
    Type: Grant
    Filed: December 23, 2008
    Date of Patent: November 26, 2013
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Fredrik Lindholm, Mattias Johansson, Karl Norrman
  • Patent number: 8588743
    Abstract: A communication device capable of preventing interference due to collision of signals of a plurality of communication devices (slaves) is provided. The communication device characterized by having a receiving part which receives a request signal by radio, a counter which starts count of a count value on reception of the request signal, a comparing part which compares the count value and a comparison value, and a transmitting part which transmits an acknowledge signal by radio in accordance with a result of the comparison is provided.
    Type: Grant
    Filed: May 11, 2007
    Date of Patent: November 19, 2013
    Assignee: Fujitsu Semiconductor Limited
    Inventors: Hiroyoshi Yamashita, Hiroyuki Fujiyama
  • Patent number: 8588424
    Abstract: A communication apparatus includes an encryption key generation unit that generates encryption key information at constant encryption key generation intervals, a common key generation unit that generates common key information uniquely with respect to a generation time at common key generation intervals set longer than the encryption key generation intervals, a common key application unit that performs encryption or decryption of the encryption key information by using the common key information, and an encryption key distribution unit that makes a request to a data transmitting/receiving unit to distribute the encryption key information to a plurality of communication apparatuses to be communicated simultaneously at encryption key distribution intervals set shorter than the encryption key generation intervals to perform communication with higher security.
    Type: Grant
    Filed: March 30, 2011
    Date of Patent: November 19, 2013
    Assignee: Fujitsu Limited
    Inventors: Kenji Yamada, Tadashige Iwao, Hidefumi Takaoka, Syunsuke Koga
  • Patent number: 8588420
    Abstract: A method for determining a time delay for sending an update request by a computing device is described. A first update request is sent by a computing device at the termination of a first random delay. A first load data is received. A second update request is sent by the computing device at the termination of a maximum update parameter. A second load data is received. The first load data is compared with the second load data. A next update time is adjusted if the first load data differs from the second load data.
    Type: Grant
    Filed: January 18, 2007
    Date of Patent: November 19, 2013
    Assignee: Panasonic Corporation
    Inventors: W. Bryant Eastham, James L. Simister
  • Patent number: 8589698
    Abstract: An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value.
    Type: Grant
    Filed: May 15, 2009
    Date of Patent: November 19, 2013
    Assignee: International Business Machines Corporation
    Inventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
  • Patent number: 8588425
    Abstract: A data processing system stores encrypted data. Object identifiers are assigned to storage objects, and data encryption keys are assigned to the storage objects. When performing an operation upon a storage object, data encryption key failure may occur due to a corrupt or incorrect key. In this case, a copy of the data encryption key is fetched from a key server. It is possible for the association of the object identifiers with the data encryption keys to become lost or confused, so that the key server may fail to provide the correct key for a specified object identifier. Therefore, an absolute key identifier that is unique across the key server namespace also is stored in association with the object identifier in the storage system and in the key store of the key server, and the absolute key identifier is used as a failsafe for recovery of encrypted data.
    Type: Grant
    Filed: March 6, 2008
    Date of Patent: November 19, 2013
    Assignee: EMC Corporation
    Inventors: John S. Harwood, Thomas E. Linnell, John T. Fitzgerald, Amnon Izhar, Charles E. Arsenault
  • Patent number: 8583930
    Abstract: A downloadable conditional access system (DCAS), a secure micro (SM), and a transport processor (TP), and a security authentication method using the same are provided. The DCAS provides a safe security environment through a security protocol which enables mutual authentication and secure channel establishment between the SM and the TP.
    Type: Grant
    Filed: March 16, 2010
    Date of Patent: November 12, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Han-seung Koo, Eun-jung Kwon, Soon-choul Kim, Hee-jeong Kim, Young-ho Jeong, O-hyung Kwon, Soo-in Lee
  • Patent number: 8582777
    Abstract: A method and system for lightweight key distribution in a wireless network comprises calculating a second intermediate value using a first intermediate value which corresponds to respective partial keys included in a key pool; generating an encryption key using the second intermediate value and encrypting a partial key corresponding to a key index in common with a new node with the encryption key; and sending a key part which contains the encrypted partial key and the second intermediate value. Therefore, if a new node joins the wireless network, the key set can be allocated to the new node using its ID while the key sets allocated to the existing nodes of the network are retained.
    Type: Grant
    Filed: April 30, 2007
    Date of Patent: November 12, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Alexey V. Urivskiy, Andrey L. Chmora
  • Patent number: 8582759
    Abstract: There is provided a method and apparatus for providing a content service. A method of providing a content service includes generating a plurality of pieces of decryption information according to a continuous period of using a broadcasting service with respect to predetermined contents, encrypting the contents, and decrypting the encrypted contents using the decryption information.
    Type: Grant
    Filed: July 13, 2011
    Date of Patent: November 12, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Hyoung-shick Kim, Myung-soo Chang