Using Master Key (e.g., Key-encrypting-key) Patents (Class 380/281)
-
Patent number: 8788807Abstract: Methods and apparatus for protecting user privacy in a shared key system. According to one aspect, a user generates a derived identity based on a key and a session variable, and sends the derived identity to an application. In one embodiment, a key server may be used to receive the derived identity from the application, and return a sub-key to the application to use for encrypting communications with the user.Type: GrantFiled: January 10, 2007Date of Patent: July 22, 2014Assignee: QUALCOMM IncorporatedInventors: Adrian Escott, James Semple
-
Patent number: 8782803Abstract: A derivative work is encrypted using a cipher created from digital sources used to create the derivative work. A software application made available for download permits a mix artist to generate a derivative-encrypted work from a derivative work that the mix artist has created using one or more of the digital sources. The derivative-encrypted work is streamed to a worldwide web server, where it is made available for download by consumers for a fee. The software application is also available for download by the consumers and permits the consumers to purchase and download any available derivative-encrypted work. However, the derivative-encrypted works can only be decrypted if the consumer has possession of a digital source for each of the source art works associated with the digital sources used to create the derivative work.Type: GrantFiled: April 14, 2010Date of Patent: July 15, 2014Assignee: Legitmix, Inc.Inventors: Omid Allen McDonald, David Ross McDonald
-
Patent number: 8781132Abstract: Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more intelligently manage multiple GKEKs. The authentication controller can use the information obtained from the authentication response message to determine which of a plurality of GKEKs to advertise in a key announcement broadcast. Furthermore, individual requests for a future LLE key (LEK) to be used for link layer encryption (LLE) encrypting and decrypting inbound and outbound group communications between base station(s) and mobile station(s) are responded to with a broadcast GKEK-encrypted transmission including the future LEK. Only the requesting mobile station transmits an acknowledgment packet in response to the broadcast.Type: GrantFiled: November 16, 2012Date of Patent: July 15, 2014Assignee: Motorola Solutions, Inc.Inventors: Chris A. Kruegel, Thomas J. Senese, Hans C. Sowa
-
Patent number: 8775794Abstract: Systems and methods for end-to-end encryption are disclosed. According to one embodiment, a method for device registration includes (1) an application executed by a computer processor receiving a user password from a user; (2) using the computer processor, the application combining the user password and a password extension; (3) using the computer processor, the application cryptographically processing the combined user password and password extension, resulting cryptographic public information; and (4) providing the cryptographic public information to a server. The user password is not provided to the server. In another embodiment, a method for user authentication includes (1) using a computer processor, receiving a login page from a server; (2) sending a Hash-based Message Authentication Code to the server; and (3) receiving an authentication from the server. In one embodiment, the login page may include a transkey and a value B.Type: GrantFiled: June 24, 2011Date of Patent: July 8, 2014Assignee: JPMorgan Chase Bank, N.A.Inventor: Glenn Benson
-
Patent number: 8768849Abstract: Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM provision apparatus includes a content download unit which downloads encrypted real content and dummy content from a download server and which manages the downloaded real content and dummy content; a license management unit which manages a license issued by a license server; and a processing unit which manages the downloaded real content and dummy content and the issued license.Type: GrantFiled: November 30, 2009Date of Patent: July 1, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Nam-Geol Lee, Hyung-Chan Kim, Gyu-Baek Kim
-
Patent number: 8763156Abstract: There is provided a system and method for a digital receipt for use with an interoperable keychest. There is provided a method for online registration of a digital receipt associated with a content, comprising performing a transaction to obtain from a first distributor the content encrypted by a title key and a first digital rights management (DRM) license usable with the first distributor to access the title key, receiving from the first distributor the digital receipt associated with the content including information relevant to the transaction, and transmitting the digital receipt to the interoperable keychest acting as a central key repository (CKR) for an online registration of the digital receipt associated with the content. Authorized media distributors may then generate new DRM licenses using the CKR, enabling interoperable content playback of the same universal file across different media distributors and clients.Type: GrantFiled: July 10, 2009Date of Patent: June 24, 2014Assignee: Disney Enterprises, Inc.Inventor: Arnaud Robert
-
Patent number: 8755526Abstract: There is provided a system and method for a universal file packager for use with an interoperable key chest. There is provided a method for distributing media contents to distributors, comprising obtaining a first key, a second key and a content, encrypting the second key using the first key to generate an encrypted second key, encrypting the content using the second key to generate an encrypted content, generating a key information file including the encrypted second key, generating a universal file including the encrypted content and a first network address for a central key repository (CKR), providing the key information file for storage in the CKR, and providing the universal file to the distributors. The universal file can then be provided to users for digital e-commerce and transferred across different distributors with the CKR negotiating key access for granting new interoperable DRM licenses.Type: GrantFiled: July 10, 2009Date of Patent: June 17, 2014Assignee: Disney Enterprises, Inc.Inventors: Arnaud Robert, Scott F. Watson
-
Patent number: 8756439Abstract: A non-transient computer usable medium has computer usable instructions embodied thereon, the computer usable instructions configured to cause a computer device to perform the steps of receiving an intermediate program code prior to execution of the intermediate program code; recognizing data storage commands within the intermediate program code; modifying the intermediate program code such that, during execution of the intermediate program code, the data is encrypted before it is stored; recognizing data retrieval commands within the intermediate program code; modifying the intermediate program code such that, during execution of the intermediate program code, the data is decrypted after it is retrieved; and providing the modified intermediate program code for execution.Type: GrantFiled: August 30, 2010Date of Patent: June 17, 2014Assignee: Physical Optics CorporationInventors: Tomasz Jannson, Thomas Forrester, Kevin Duane Degrood, Kathy Mai Nguyen, Andrew Kostrzewski, Kang Lee, Eric Gans, Kevin Carl Walter
-
Patent number: 8755527Abstract: A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to management of the key material populating one or more key management fields that define attributes that limit distribution of the key material.Type: GrantFiled: May 4, 2011Date of Patent: June 17, 2014Assignee: International Business Machines CorporationInventors: Todd W. Arnold, Elizabeth A. Dames, Carsten D. Frehr, Michael J. Kelly, Kenneth B. Kerr, Richard V. Kisley, Eric D. Rossman, Eric B. Smith
-
Patent number: 8755528Abstract: A method and system for establishing a secure connection between stations are disclosed. The method includes that: 1) a switch device receives an inter-station key request packet sent by a first user terminal; 2) the switch device generates an inter-station key, constructs an inter-station key announcement packet and sends it to a second user terminal; 3) the switch device receives an inter-station key announcement response packet sent by the second user terminal; 4) the switch device constructs an inter-station key announcement response packet and sends it to the first user terminal; 5) the switch device receives an inter-station key announcement response packet sent by the first user terminal. The switch device establishes an inter-station key for the two stations which are connected to the switch device directly, by which the embodiments of the present invention ensure the confidentiality and integrality of user data between the stations.Type: GrantFiled: May 21, 2010Date of Patent: June 17, 2014Assignee: China Iwncomm Co., Ltd.Inventors: Li Ge, Jun Cao, Manxia Tie, Qin Li, Xiaolong Lai
-
Patent number: 8745415Abstract: A system, method, and computer-readable storage medium for protecting a set of storage devices using a secret sharing scheme. The data of each storage device is encrypted with a key, and the key is encrypted based on a shared secret and a device-specific value. Each storage device stores a share and its encrypted key, and if a number of storage devices above a threshold are available, then the shared secret can be reconstructed from the shares and used to decrypt the encrypted keys. Otherwise, the secret cannot be reconstructed if less than the threshold number of storage devices are accessible, and then data on the storage devices will be unreadable.Type: GrantFiled: September 26, 2012Date of Patent: June 3, 2014Assignee: Pure Storage, Inc.Inventors: Ethan Miller, John Colgrove, John Hayes
-
Patent number: 8738911Abstract: A method for managing keystore information on a computing device may include requesting a keystore from a distribution system, receiving the keystore from the distribution system, and populating a runtime environment with keystore information contained within the keystore. A method for generating a keystore may include receiving, by a distribution system, a request for a keystore from a computing device, generating a key pair including a public key and a private key, generating a certificate signing request, digitally signing the public key with the private key, generating the keystore, combining the signed public key with the private key in the keystore, and providing the keystore to the computing device. A method for generating a truststore may include receiving, by a distribution system, a request for a truststore from a computing device, generating the truststore, adding a certificate to the truststore, and providing the truststore to the computing device.Type: GrantFiled: June 25, 2012Date of Patent: May 27, 2014Assignee: AT&T Intellectual Property I, L.P.Inventor: Andrew Schiefelbein
-
Publication number: 20140140514Abstract: A method includes encrypting information in accordance with an encryption scheme that uses a public key; encrypting a plurality of instances of a secret key, each being encrypted using at least one additional instance of the public key; sending the encrypted information and the plurality of encrypted instances of the secret key to a destination; receiving an encrypted result from the destination; and decrypting the encrypted result. A further method includes receiving a plurality of encrypted secret keys and information descriptive of a function to be performed on data; converting the information to a circuit configured to perform the function on the data; and applying the data to inputs of the circuit and evaluating the data using, in turn, the plurality of encrypted secret keys.Type: ApplicationFiled: December 5, 2013Publication date: May 22, 2014Applicant: International Business Machines CorporationInventor: Craig B. Gentry
-
Patent number: 8732423Abstract: A network memory system is disclosed. The network memory system comprises a first appliance configured to encrypt first data, store the encrypted first data in a first memory device. The first appliance also determines whether the encrypted first data exists in a second appliance and transmits a store instruction comprising the encrypted first data based on the determination that the encrypted first data does not exist in the second appliance. The second appliance is configured to receive the store instruction from the first appliance and store the encrypted first data in a second memory device. The second appliance is further configured to receive a retrieve instruction comprising a location indicator indicating where the encrypted first data is stored, process the retrieve instruction to obtain encrypted response data, and decrypt the encrypted response data.Type: GrantFiled: February 1, 2013Date of Patent: May 20, 2014Assignee: Silver Peak Systems, Inc.Inventor: David Anthony Hughes
-
Patent number: 8712056Abstract: Security in a mobile ad hoc network is maintained by using various forms of encryption, various encryption schemes, and various multi-phase keying techniques. In one configuration, an over the air, three-phase, re-keying technique is utilized to ensure that no authorized nodes are lost during re-keying and that nodes that are intended to be excluded from re-keying are excluded. In another configuration, an over the air, two-phase keying technique, is utilized to maintain backwards secrecy.Type: GrantFiled: June 3, 2010Date of Patent: April 29, 2014Assignee: AT&T Intellectual Property I, L.P.Inventor: Robert Hall
-
Patent number: 8707450Abstract: Methods, apparatuses and storage medium associated digital rights management (DRM) using DRM locker is disclosed herein. In embodiments, a DRM locker is provided to a client device. The DRM locker may be configured to store a number of DRM licenses or keys for a number of DRM protected contents. The DRM locker, on presentation of an associated locker key, may respond to a request for one or more of the stored DRM licenses or keys, to enable consumption of the corresponding DRM protected contents using the client device. Other embodiments may be disclosed or claimed.Type: GrantFiled: August 3, 2012Date of Patent: April 22, 2014Assignee: Intel CorporationInventors: Christopher J. McConnell, Uday R. Savagaonkar
-
Patent number: 8681996Abstract: A method of asymmetric key wrapping in a system is disclosed. The method generally includes the steps of (A) transferring a shared key from a key storage to a cipher operation, wherein the cipher operation comprises a symmetric-key cipher utilizing a cipher key, (B) generating an encrypted key by encrypting a decrypted key with the cipher operation using the shared key as the cipher key in a wrap-encrypt mode and (C) presenting the encrypted key external to the system in the wrap-encrypt mode.Type: GrantFiled: July 31, 2007Date of Patent: March 25, 2014Assignee: LSI CorporationInventor: Anton I. Sabev
-
Patent number: 8675878Abstract: There is provided a system and method for distributors to use an interoperable key chest. There is provided a method for use by a distributor to obtain content access authorizations from a key chest or central key repository (CKR), the method comprising receiving a user request from a user device for access to an encrypted content identified by a content identification, transmitting a key request to the CKR including the content identification, receiving an encrypted first key from the CKR, decrypting the encrypted first key using a second key to retrieve the first key, and providing a DRM license for the encrypted content to the user device using the first key for use by the user device to decrypt the encrypted content using the first key. By generating such DRM licenses, distributors can unlock protected content even sourced from distributors using different DRM schemas.Type: GrantFiled: April 25, 2013Date of Patent: March 18, 2014Assignee: Disney Enterprises, Inc.Inventors: Arnaud Robert, Scott F. Watson
-
Patent number: 8661248Abstract: A method, apparatus, and system for sending and receiving a security policy of multicast sessions are provided. The method for sending the security policy of multicast sessions includes: after a Datagram Transport Layer Security (DTLS) session is set up between a sender and a receiver, receiving a security policy request from the receiver, constructing a security policy response according to a security policy, multiplexing the security policy response and Secure Real-Time Transport Protocol (SRTP) multicast session data, and sending the multiplexed data to the receiver.Type: GrantFiled: October 30, 2009Date of Patent: February 25, 2014Assignee: Huawei Technologies Co., Ltd.Inventor: Xu Chen
-
Patent number: 8654974Abstract: A system for securing information. The system includes a first tracking device associated with an object or an individual. In one embodiment, the first tracking device generates independently a synchronous secret key and a server generates independently the synchronous secret key. Over an insecure communication channel, the server communicates an asynchronous vector pair encrypted with the synchronous secret key with the tracking device. To securely communicate information, messages are encrypted and decrypted using the asynchronous vector pair between the tracking device and the server. To further secure message information, a set of random numbers may be further utilized with the asynchronous vector pair to further encrypt and decrypt the messages communicated between the tracking device and the server.Type: GrantFiled: October 18, 2007Date of Patent: February 18, 2014Assignee: Location Based Technologies, Inc.Inventors: Roger B. Anderson, Jennifer B. Anderson
-
Patent number: 8654981Abstract: A system for processing multimedia channels is described comprising: transmitting decryption keys for decrypting the multimedia channels, the keys encrypted in both a first encryption format and a second encryption format; the keys encrypted in the first encryption format being decryptable by a first type of multimedia receiver; and the keys encrypted in the second encryption format being decryptable by a second type of multimedia receiver.Type: GrantFiled: December 5, 2008Date of Patent: February 18, 2014Assignee: AARIS Enterprises, Inc.Inventors: William M. Gillon, Stephen G. Perlman
-
Patent number: 8656159Abstract: In some embodiments, a method includes receiving a modifiable electronic document. The method includes generating a new version of the modifiable electronic document. The method also includes encrypting the new version of the modifiable electronic document using an encryption key that is used to encrypt the modifiable electronic document and different versions of the modifiable electronic document. The method includes saving the new version of the modifiable electronic document.Type: GrantFiled: October 11, 2007Date of Patent: February 18, 2014Assignee: Adobe Systems IncorporatedInventor: James Donahue
-
Patent number: 8646054Abstract: The present invention provides a bridged, direct-attached storage device that can be secured and work with any host system. In one embodiment, the storage device is configured with a secured user area and an unlocking mechanism for access to the secured user area. The storage device may comprise a translation module having a bridge that presents multiple logical units to a host. In addition, the storage device may comprise a controller having its own encryption engine to encrypt the entire user area of the storage media. In one embodiment, the storage device presents the unlocking mechanism via a second logical device as a read-only device, such as a CD/DVD-ROM, or virtual CD device. The secondary logical device comprises executable code, which allows the user, for example, to enter, change, or remove the password and unlock the user area.Type: GrantFiled: March 23, 2012Date of Patent: February 4, 2014Assignee: Western Digital Technologies, Inc.Inventors: Christopher P. Karr, John E. Maroney
-
Patent number: 8645687Abstract: A digital file is associated with a security attribute in which identification data for a physical key is stored. The digital file content is encrypted, and may not be decrypted by a receiving computer unless a removable physical key that can be associated with the receiving computer includes identification data which matches the identification data stored in the file's security attribute. The digital content encrypted in the file may be compressed, and a portion of the security attribute may also be encrypted. When a portion of the security attribute is encrypted, the receiving computer may decrypt only the encrypted portion of the security attribute unless the identification data of the security attribute matches the identification data of a physical key physically or wirelessly coupled to the receiving computer. Improved security and reduction of pirating of the digital content are therefore provided.Type: GrantFiled: August 3, 2011Date of Patent: February 4, 2014Assignee: NBCUniversal Media, LLCInventor: Jeffrey Edward Taylor
-
Patent number: 8638943Abstract: A communication device includes an antenna for transmitting and receiving signals with a reader/writer of a service issuing terminal; a recording unit recorded with data, and also recorded with a pattern in which information specifying an authentication key and access attribute indicating whether or not a readout process or a write process on the data is possible using the authentication key are corresponded; and a control unit for, when receiving one or plural information specifying a region of the data from the reader/writer of the service issuing terminal via the antenna, holding the received one or plural information specifying the region of the data.Type: GrantFiled: April 29, 2009Date of Patent: January 28, 2014Assignee: Sony CorporationInventors: Toshinori Kanemoto, Teiichi Shiga
-
Patent number: 8638935Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key.Type: GrantFiled: January 12, 2012Date of Patent: January 28, 2014Assignee: Apple Inc.Inventors: Gianpaolo Fasoli, Augustin J. Farrugia, Bertrand Mollinier Toublet, Gelareh Taban, Nicholas T. Sullivan, Srinivas Vedula
-
Patent number: 8638939Abstract: The present disclosure provides for the use of non-alphanumeric, non-biometric inputs to authenticate a user accessing secured data or functions on an electronic device. In one embodiment, an authentication screen is invoked by use of a gesture input via a touch-sensitive structure. In such an embodiment, an authentication screen may be invoked with no outward appearance on the display as to the existence of the data or function for which access is sought. The authentication may be based upon a gesture, a sequence of selected objects, or another non-alphanumeric, non-biometric input.Type: GrantFiled: August 20, 2009Date of Patent: January 28, 2014Assignee: Apple Inc.Inventors: Brandon J. Casey, Erik Cressall
-
Patent number: 8640210Abstract: A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.Type: GrantFiled: September 1, 2011Date of Patent: January 28, 2014Assignee: Microsoft CorporationInventors: Mark Novak, Paul J. Leach, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan
-
Patent number: 8640249Abstract: Provided is a digital broadcasting conditional access system and method, including a digital broadcasting transmitter and a digital broadcasting receiver. The transmitter scrambles a broadcasting signal using a control key, generates broadcasting viewing restriction information and broadcasting viewing entitlement information, and transmits the scrambled broadcasting signal after incorporating the broadcasting viewing restriction information and broadcasting viewing entitlement information into the scrambled broadcasting signal. The receiver extracts the broadcasting viewing restriction information and the broadcasting viewing entitlement information included in the scrambled broadcasting signal to generate the control key, descrambles the broadcasting signal using the control key, and reproduces the descrambled broadcasting signal. Thus, the system and method can be provided for a digital broadcasting receiver including a smart card.Type: GrantFiled: October 13, 2006Date of Patent: January 28, 2014Assignee: Samsung Electronics Co., LtdInventor: Young-Sik Park
-
Patent number: 8630422Abstract: A method includes encrypting information in accordance with an encryption scheme that uses a public key; encrypting a plurality of instances of a secret key, each being encrypted using at least one additional instance of the public key; sending the encrypted information and the plurality of encrypted instances of the secret key to a destination; receiving an encrypted result from the destination; and decrypting the encrypted result. A further method includes receiving a plurality of encrypted secret keys and information descriptive of a function to be performed on data; converting the information to a circuit configured to perform the function on the data; and applying the data to inputs of the circuit and evaluating the data using, in turn, the plurality of encrypted secret keys.Type: GrantFiled: November 10, 2009Date of Patent: January 14, 2014Assignee: International Business Machines CorporationInventor: Craig B. Gentry
-
Patent number: 8630416Abstract: Embodiments of a wireless device and methods for rekeying with reduced packet loss in a wireless network are generally described herein. In some embodiments, during rekeying operations a new key for reception may be installed early (i.e., prior to receipt of a rekeying confirmation message). The use of the new key for transmission may be delayed until after receipt of the rekeying confirmation message. The early installation of the new key for reception may allow both the new key and old key to be active at the same time for use decrypting received packets to reduce packet loss during rekeying operations. The rekeying confirmation message may be the fourth message of a four-way handshake for rekeying. In some embodiments, two key identifiers may be alternated between four-way handshakes to prevent deletion of the old key.Type: GrantFiled: December 21, 2009Date of Patent: January 14, 2014Assignee: Intel CorporationInventors: Emily H. Qi, Jesse R. Walker, Robert J. Stacey, Herbert Liondas, Marc Jalfon
-
Patent number: 8625800Abstract: Transferring control of a secure element between TSMs comprises a zone master key established between the TSMs that facilitates encryption of a temporary key. The TSMs create the zone master key prior to initiation of transfer of control. Once transfer of control is initiated, the first TSM establishes a communication channel and deletes its key from the secure element. The first TSM creates a temporary key that is encrypted with the zone master key established between the first TSM and the second TSM. The encrypted temporary key is communicated to the second TSM with a device identifier. The second TSM decrypts the temporary key using the zone master key and identifies the user device using the device identifier. The new TSM establishes a communication channel and deletes the temporary key from the secure element. The new TSM then inputs and saves its key into the secure element.Type: GrantFiled: February 25, 2013Date of Patent: January 7, 2014Assignee: Google Inc.Inventors: Sarel Kobus Jooste, John Joseph, Shane Alexander Farmer
-
Patent number: 8619994Abstract: The present invention relates to a method and system for providing a digital content service that provides packaging content consisting of digital rights management (DRM) content and advertisement content, and is able to use the DRM content for free by watching or listening to the advertisement content, including: generating packaging content consisting of pilot content and target content, which has been encrypted using an encryption key of the pilot content, and providing the packaging content to a portable terminal; and obtaining a decryption key for the target content through playing the pilot content of the packaging content, and playing the target content by the decryption key, by the portable terminal.Type: GrantFiled: November 25, 2009Date of Patent: December 31, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Kyung Keun Lee, Byung Rae Lee, Seong Hun Bang
-
Patent number: 8621595Abstract: A method of network gateway authenticating involves a network gateway receiving an authentication request from a communications terminal. The communications terminal is in communication with an identity token. The authentication request includes a token cryptogram generated from a cryptographic key stored on the identity token. The network gateway transmits the authentication request to a communications network, and receives an authentication response from the communications network in accordance with a validity of the token cryptogram. The authentication response includes a gateway authentication certificate. The gateway authentication certificate is configured to authenticate the network gateway to a network device of the communications network.Type: GrantFiled: March 25, 2013Date of Patent: December 31, 2013Assignee: The Toronto Dominion BankInventors: Robert Hayhow, Bryan Michael Gleeson
-
Patent number: 8621243Abstract: In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a manner that allows the data to be obtained from the ciphertext only if one or more conditions are satisfied. In accordance with another aspect, a bit string is received from a calling program. Data in the bit string is decrypted using public key decryption and returned to the calling program only if one or more conditions included in the bit string are satisfied.Type: GrantFiled: January 27, 2011Date of Patent: December 31, 2013Assignee: Microsoft CorporationInventors: Paul England, Marcus Peinado
-
Patent number: 8619993Abstract: A system and method of providing content protection for OMA Broadcast smartcard profiles. When an electronic device has a content item for encryption, the device generates a random number. The electronic device then transmits a content encryption key request message, including the random number and a service encryption key identifier, to a smartcard, which then responds with a a content encryption key response message. The content encryption key response message includes the random number and a content encryption key. The electronic device can then use the content encryption key to manage the encryption of the content item. The electronic device stores random number, service key identifier and encrypted content item into a certain file format. The electronic device sends again content encryption key request at the time of rendering. The content encryption key returned by the content encryption key response message is used for the decryption of the stored content item.Type: GrantFiled: June 27, 2007Date of Patent: December 31, 2013Assignee: Nokia CorporationInventor: Sanjeev Verma
-
Patent number: 8615787Abstract: This invention provides for a transaction card for use at a terminal and for initiating an internet transaction with a SSL protected server, wherein the card comprises a smartcard including an application arranged for extending an SSL connection from the said protected server into the smartcard and, further, the invention can provide for a related terminal, server and related transaction initiation and establishment methods, for extending the said SSL connection as noted above.Type: GrantFiled: May 15, 2007Date of Patent: December 24, 2013Assignee: NXP B.V.Inventor: Bruce Murray
-
Patent number: 8612355Abstract: Provided is digital rights management (DRM) provision technology, and more particularly, are an apparatus, system, and method which can easily provide content using one or more DRM systems. A DRM provision apparatus includes a content download unit which downloads encrypted real content and dummy content from a download server and which manages the downloaded real content and dummy content; a license management unit which manages a license issued by a license server; and a processing unit which manages the downloaded real content and dummy content and the issued license.Type: GrantFiled: September 24, 2007Date of Patent: December 17, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Nam-Geol Lee, Hyung-Chan Kim, Gye-Baek Kim
-
Patent number: 8608064Abstract: A payment system and method of IC card and a multi-application IC card as well as payment terminal are proposed in the present invention. The terminal and the IC card perform off-line data authentication using an asymmetric key algorithm during an off-line transaction, and if the transaction is not approved in manner of off-line, the terminal and the IC card performs an on-line transaction via a host. Therefore, the payment system and method of IC card and the multi-application IC card as well as payment terminal disclosed in the present invention can be used both in machinery without on-line transaction environment and in standard merchant machinery with on-line transaction environment.Type: GrantFiled: August 24, 2010Date of Patent: December 17, 2013Assignee: China Unionpay Co., Ltd.Inventors: Jinyao Xu, Chunhuan Li, Chunye Hui, Jianning Bo, Hongwen Meng, Yanmei Zhou, Denfeng Han
-
Publication number: 20130329890Abstract: An offline immobilizer ECU reads an encryption key generation code from an offline additional electronic key and generates an electronic key encryption key for the offline additional electronic key using the encryption key generation code and a communication subject key encryption key held by the immobilizer ECU. The immobilizer ECU stores, in a memory, the generated electronic key encryption key and a key ID code that is read from the offline additional electronic key.Type: ApplicationFiled: May 28, 2013Publication date: December 12, 2013Inventors: Daisuke KAWAMURA, Hiroaki IWASHITA, Masaki HAYASHI, Toshihiro NAGAE, Hisashi KATO, Tetsuya EGAWA
-
Patent number: 8607069Abstract: A data processing apparatus is disclosed, that comprises a large capacity memory means for storing a plurality of files, a memory means for storing move/copy history when a particular file is moved/copied from the large capacity memory means to a non-volatile memory, a reference means for referencing the history information stored in the memory means when the particular file is moved/copied from the large capacity memory means to the non-volatile memory, and a control means for prohibiting the particular file from being moved/copied from the large capacity memory means to the non-volatile memory when the reference means has detected that the history information is stored in the memory means.Type: GrantFiled: June 4, 2004Date of Patent: December 10, 2013Assignee: Sony CorporationInventors: Nobuyuki Kihara, Teppei Yokota
-
Patent number: 8594334Abstract: The present invention relates to a key management method to establish selective secret information in multiple disjoint groups, more specifically to a method of reducing the broadcast size in access hierarchies and localize and facilitate management in said access hierarchies. The key management method selects a number of subgroups. Each subgroup supports an instance of a key distribution method for receiving distributed key material, and is capable of computing a usage security key based on the distributed key material and predefined user group key material.Type: GrantFiled: December 23, 2008Date of Patent: November 26, 2013Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Fredrik Lindholm, Mattias Johansson, Karl Norrman
-
Patent number: 8588743Abstract: A communication device capable of preventing interference due to collision of signals of a plurality of communication devices (slaves) is provided. The communication device characterized by having a receiving part which receives a request signal by radio, a counter which starts count of a count value on reception of the request signal, a comparing part which compares the count value and a comparison value, and a transmitting part which transmits an acknowledge signal by radio in accordance with a result of the comparison is provided.Type: GrantFiled: May 11, 2007Date of Patent: November 19, 2013Assignee: Fujitsu Semiconductor LimitedInventors: Hiroyoshi Yamashita, Hiroyuki Fujiyama
-
Patent number: 8588424Abstract: A communication apparatus includes an encryption key generation unit that generates encryption key information at constant encryption key generation intervals, a common key generation unit that generates common key information uniquely with respect to a generation time at common key generation intervals set longer than the encryption key generation intervals, a common key application unit that performs encryption or decryption of the encryption key information by using the common key information, and an encryption key distribution unit that makes a request to a data transmitting/receiving unit to distribute the encryption key information to a plurality of communication apparatuses to be communicated simultaneously at encryption key distribution intervals set shorter than the encryption key generation intervals to perform communication with higher security.Type: GrantFiled: March 30, 2011Date of Patent: November 19, 2013Assignee: Fujitsu LimitedInventors: Kenji Yamada, Tadashige Iwao, Hidefumi Takaoka, Syunsuke Koga
-
Patent number: 8588420Abstract: A method for determining a time delay for sending an update request by a computing device is described. A first update request is sent by a computing device at the termination of a first random delay. A first load data is received. A second update request is sent by the computing device at the termination of a maximum update parameter. A second load data is received. The first load data is compared with the second load data. A next update time is adjusted if the first load data differs from the second load data.Type: GrantFiled: January 18, 2007Date of Patent: November 19, 2013Assignee: Panasonic CorporationInventors: W. Bryant Eastham, James L. Simister
-
Patent number: 8589698Abstract: An approach is provided to receive a request at a first computer system from a second system. The first system generates an encryption key, modifies retrieved source code by inserting the generated encryption key into the source code, and compiles the modified source code into an executable. A hash value of the executable program is calculated and is stored along with the encryption key in a memory area. The executable and the hash value are sent to the second system over a network. The executable is executed and it generates an encrypted result using the hash value and the embedded encryption key. The encrypted result is sent back to the first system where it is authenticated using the stored encryption key and hash value.Type: GrantFiled: May 15, 2009Date of Patent: November 19, 2013Assignee: International Business Machines CorporationInventors: Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Patent number: 8588425Abstract: A data processing system stores encrypted data. Object identifiers are assigned to storage objects, and data encryption keys are assigned to the storage objects. When performing an operation upon a storage object, data encryption key failure may occur due to a corrupt or incorrect key. In this case, a copy of the data encryption key is fetched from a key server. It is possible for the association of the object identifiers with the data encryption keys to become lost or confused, so that the key server may fail to provide the correct key for a specified object identifier. Therefore, an absolute key identifier that is unique across the key server namespace also is stored in association with the object identifier in the storage system and in the key store of the key server, and the absolute key identifier is used as a failsafe for recovery of encrypted data.Type: GrantFiled: March 6, 2008Date of Patent: November 19, 2013Assignee: EMC CorporationInventors: John S. Harwood, Thomas E. Linnell, John T. Fitzgerald, Amnon Izhar, Charles E. Arsenault
-
Patent number: 8583930Abstract: A downloadable conditional access system (DCAS), a secure micro (SM), and a transport processor (TP), and a security authentication method using the same are provided. The DCAS provides a safe security environment through a security protocol which enables mutual authentication and secure channel establishment between the SM and the TP.Type: GrantFiled: March 16, 2010Date of Patent: November 12, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Han-seung Koo, Eun-jung Kwon, Soon-choul Kim, Hee-jeong Kim, Young-ho Jeong, O-hyung Kwon, Soo-in Lee
-
Patent number: 8582777Abstract: A method and system for lightweight key distribution in a wireless network comprises calculating a second intermediate value using a first intermediate value which corresponds to respective partial keys included in a key pool; generating an encryption key using the second intermediate value and encrypting a partial key corresponding to a key index in common with a new node with the encryption key; and sending a key part which contains the encrypted partial key and the second intermediate value. Therefore, if a new node joins the wireless network, the key set can be allocated to the new node using its ID while the key sets allocated to the existing nodes of the network are retained.Type: GrantFiled: April 30, 2007Date of Patent: November 12, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Alexey V. Urivskiy, Andrey L. Chmora
-
Patent number: 8582759Abstract: There is provided a method and apparatus for providing a content service. A method of providing a content service includes generating a plurality of pieces of decryption information according to a continuous period of using a broadcasting service with respect to predetermined contents, encrypting the contents, and decrypting the encrypted contents using the decryption information.Type: GrantFiled: July 13, 2011Date of Patent: November 12, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Hyoung-shick Kim, Myung-soo Chang