Multiple Key Level Patents (Class 380/45)
  • Patent number: 8209545
    Abstract: Circuits, methods, and apparatus that prevent detection and erasure of encoding or encryption keys. These encoding keys may be used to encode a configuration bitstream or other data for an FPGA or other device. An exemplary embodiment of the present invention masks a first key to form an encoding key in order to prevent detection of the first key. In a specific embodiment, the first key is encoded using a second key. The encoded key is used to encode a configuration bitstream or other data. The encoded key is stored on an FPGA or other device. When the device is to be configured, the encoded key is retrieved and used to decode the bitstream or other data. A further embodiment stores an encryption key in a one-time programmable memory (OTP) array to prevent its erasure or modification. The encoding key may be further obfuscated before storage.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: June 26, 2012
    Assignee: Altera Corporation
    Inventors: Martin Langhammer, Juju Joyce, Keone Streicher, David Jefferson, Srinivas Reddy, Nitin Prasad
  • Publication number: 20120155638
    Abstract: In the field of computer enabled cryptography, such as a block cipher, the cipher is hardened against an attack by protecting the cipher key, by applying to it a predetermined linear permutation before using one key to encrypt or decrypt a message. This is especially advantageous in a “White Box” environment where an attacker has full access to the cipher algorithm, including the algorithm's internal state during its execution. This method and the associated computing apparatus are useful where the key is derived through a process and so is unknown when the software code embodying the cipher is compiled. This is typically the case where there are many users of the cipher and each has his own key, or where each user session has its own key.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: Apple Inc.
    Inventors: Augustin J. FARRUGIA, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart
  • Patent number: 8205085
    Abstract: The invention provides a key update system for a multihop network system including an authentication management device that manages keys using a hierarchical structure. That device constructs key information having a hierarchical structure in accordance with the structure of the multihop network. In addition, that device determines respective encryption keys for encrypting the keys based on the key information, and the communication terminals obtain the respective keys. In this system, that device includes a key tree management portion that constructs and manages the key information; an encryption portion that encrypts the keys using the keys included in the key information; and a transmission portion that transmits the encrypted keys. Each communication terminal includes a receiving portion that receives the encrypted keys; a key management portion that manages the keys that need to be held and stored by the given communication terminal; and a decryption portion that decrypts the encrypted keys.
    Type: Grant
    Filed: December 12, 2006
    Date of Patent: June 19, 2012
    Assignee: Oki Electric Industry Co., Ltd.
    Inventor: Taketsugu Yao
  • Patent number: 8201264
    Abstract: Federated systems for issuing playback certifications granting access to technically protected content are described. One embodiment of the system includes a registration server connected to a network, a content server connected to the network and to a trusted system, a first device including a non-volatile memory that is connected to the network and a second device including a non-volatile memory that is connected to the network. In addition, the registration server is configured to provide the first device with a first set of activation information in a first format, the first device is configured to store the first set of activation information in non-volatile memory, the registration server is configured to provide the second device with a second set of activation information in a second format, and the second device is configured to store the second set of activation information in non-volatile memory.
    Type: Grant
    Filed: March 25, 2009
    Date of Patent: June 12, 2012
    Assignee: DIVX, LLC
    Inventors: Eric W. Grab, Chris Russell, Francis Chan, Mike Kiefer
  • Patent number: 8199910
    Abstract: A signature generation apparatus generates a signature for a message m from the i-th user, and computes any two or three of a[1]?[x] (mod n), a[2]?[s] (mod n), and w?[t] (mod l) are in parallel. For this reason, the signature generation apparatus is provided with a plurality of fast arithmetic units (sub-IPs) within the IP core. The individual sub-IPs are connected to each other via a narrow-band, single-layer local bus.
    Type: Grant
    Filed: June 30, 2009
    Date of Patent: June 12, 2012
    Assignee: NEC Corporation
    Inventors: Sumio Morioka, Toshinori Araki
  • Publication number: 20120140923
    Abstract: Various techniques and procedures related to encryption key versioning and rotation in a multi-tenant environment are presented here. One approach employs a computer-implemented method of managing encrypted data and their associated encryption keys. In accordance with this approach, a key splitting process securely stores a master key used to encrypt tenant-level encryption keys, a key versioning process is used to securely track updated encryption keys, and a key rotation process is used to rotate encrypted data to an updated version of a tenant-level encryption key.
    Type: Application
    Filed: August 9, 2011
    Publication date: June 7, 2012
    Applicant: SALESFORCE.COM, INC.
    Inventors: Jong Lee, Charles Mortimore
  • Publication number: 20120128153
    Abstract: Symmetric-key encryption method for transforming a sequence of plaintext symbols into a sequence of ciphertext symbols, includes an iterative encryption process including: computing an altered current internal state by combining a current internal state with a current memory symbol; computing a next internal state from the altered current internal state; generating a keystream symbol from the next internal state; verifying whether the generated keystream symbol satisfies a condition related to data-format/syntax rules; iteratively computing next internal states and iteratively generating keystream symbols; and iteratively encrypting plaintext symbols by employing next keystream symbols to obtain the sequence of ciphertext symbols.
    Type: Application
    Filed: July 28, 2009
    Publication date: May 24, 2012
    Inventor: Jovan Golic
  • Patent number: 8185732
    Abstract: An information processing apparatus includes: a data processing unit that acquires content codes including a data processing program recorded in an information recording medium and executes data processing according to the content codes; and a memory that stores an apparatus certificate including an apparatus identifier of the information processing apparatus. The data processing unit is configured to execute an apparatus checking process applying the apparatus certificate stored in the memory on the basis of a code for apparatus checking process included in the content codes, acquire the apparatus identifier recorded in the apparatus certificate after the apparatus checking process, and execute data processing applying content codes corresponding to the acquired apparatus identifier.
    Type: Grant
    Filed: January 25, 2007
    Date of Patent: May 22, 2012
    Assignee: Sony Corporation
    Inventor: Yoshikazu Takashima
  • Patent number: 8180049
    Abstract: Methods and systems are provided for generating and verifying signatures of digital messages communicated between signers and verifiers. Using bilinear mappings, such as Weil or Tate pairings, these methods and systems enable generation and verification of efficient multisignatures, identity-based ring signatures, hierarchical proxy signatures, and hierarchical online/offline signatures.
    Type: Grant
    Filed: February 24, 2010
    Date of Patent: May 15, 2012
    Assignee: NTT DoCoMo, Inc.
    Inventor: Craig B. Gentry
  • Patent number: 8175269
    Abstract: A system and method for enterprise security including symmetric key protection. In accordance with an embodiment, the system provides a higher level of protection against unauthorized key disclosure by encrypting randomly generated seed data used for key generation, and using digital signatures and asymmetric encryption.
    Type: Grant
    Filed: July 5, 2006
    Date of Patent: May 8, 2012
    Assignee: Oracle International Corporation
    Inventor: Denis Pilipchuk
  • Patent number: 8176324
    Abstract: Methods and systems provide a secure virtual keyboard represented as an onscreen keyboard with multiple levels of security. The secure virtual keyboard provides keys that are a combination of numerals, alphabets and special characters. Different security features provided include, but are not limited to, randomly changing the key layout, providing an option for mouse-hover input, and using a secure encrypted transmission path.
    Type: Grant
    Filed: July 2, 2009
    Date of Patent: May 8, 2012
    Assignee: Exelis Inc.
    Inventor: Hema Krishnamurthy
  • Patent number: 8175276
    Abstract: An encryption apparatus (14) includes a secure processing system (12) in the form of an integrated circuit. The secure processing system (12) includes an on-chip secure memory system (30). The secure memory system (30) includes a non-volatile, read-only, permanent key register (62) in which a permanent cryptographic key (64) is stored. The secure memory system (30) also includes a non-volatile, read-write, erasable key register (56) in which an erasable cryptographic key (60) is stored. Symmetric cryptographic operations take place in an encryption engine (46) using an operating cryptographic key (68) formed by combining (96) the permanent and erasable keys (64, 60). A tamper detection circuit (70) detects tampering and erases the erasable key (60) when a tamper event is detected.
    Type: Grant
    Filed: February 4, 2008
    Date of Patent: May 8, 2012
    Assignee: Freescale Semiconductor, Inc.
    Inventors: Thomas E. Tkacik, Asaf Ashkenazi
  • Patent number: 8171564
    Abstract: A video encryption/decryption scheme is provided allowing an originator of video content to encrypt the video content using a session key, wherein the encrypted content and an encrypted form of the session key are provided to a destination. The session key is encrypted using a long term key value, and the long term key value itself is encrypted using shared secret information that is only stored in the main memory of the originator and destination's systems. The long term key is encrypted, typically by a third party, and provided to the originator and destination systems for encrypting/decrypting the session key. The third party also provides a pass phrase file, which the originator and destination systems can use as input with shared secret information to a certain cryptographic hashing algorithm to encrypt/decrypt the long term key.
    Type: Grant
    Filed: April 17, 2009
    Date of Patent: May 1, 2012
    Assignee: Ericsson Television Inc.
    Inventors: Alan Rouse, Paul Christien Bentz
  • Patent number: 8165285
    Abstract: The invention relates, mainly to a cryptographic process using an elliptic curve represented by means of an equation containing first and second parameters (a, b), a bilinear matching, and calculations in a finite group of integers constructed around at least one first reduction rule reducing each integer to its remainder in a whole division by a first prime number (p) that constitutes a third parameter, the elements of the finite group being in bijection with points selected on the elliptic curve, and the number of which is linked to a fourth parameter (q), where this process uses public and private keys, each of which is represented by a given point of the elliptic curve or by a multiplication factor between two points of this curve. According to the invention, the first reduction rule is the only reduction rule implemented, and the elliptic curve is obtained through a step-by-step construction process, directly allocating to the finite group q*q q-order points in the elliptic curve.
    Type: Grant
    Filed: January 23, 2006
    Date of Patent: April 24, 2012
    Assignee: Gemalto SA
    Inventor: Eric Brier
  • Patent number: 8166038
    Abstract: A technique enables intelligent retrieval of digital assets. The technique involves gathering metadata based on a scan of the digital assets. The gathered metadata includes metadata entries, each metadata entry identifying a particular digital asset and a particular set of digital asset properties of that particular digital asset. The technique further involves storing the digital assets in encrypted form within a digital asset repository of the electronic system after gathering the metadata, and updating a metadata database of the electronic system based on the metadata entries, the metadata database being distinct from the digital asset repository. Accordingly, while the digital assets are stored in the digital asset repository in encrypted form, specific digital assets within the digital asset repository are identifiable in response to a database search of the metadata database since the database search is able to use digital asset properties as searching criteria.
    Type: Grant
    Filed: June 11, 2009
    Date of Patent: April 24, 2012
    Inventors: Mark A. Kaufman, Terry Smith
  • Patent number: 8160256
    Abstract: A key calculation method and a shared key generation method, the key calculation method including: generating two keys to perform a key calculation; calculating a first value based on coefficients having an identical coefficient value among coefficients included in each of the two keys; and performing a coordinates operation or an exponentiation operation based on the first value, wherein the calculating of the first value is performed with respect to each of coefficient values included in the two keys, excluding 0.
    Type: Grant
    Filed: August 8, 2007
    Date of Patent: April 17, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Jeong Hyun Yi, Jung Hee Cheon, Taekyoung Kwon, Mun-Kyu Lee, Eunah Kim
  • Patent number: 8155309
    Abstract: An apparatus and method is provided for protecting data in a non-volatile memory by using an encryption and decryption that encrypts and decrypts the address and the data stored in the non-volatile memory using a code read only memory that stores encryption and decryption keys that are addressed by a related central processing unit at the same time data is being written or read from the non-volatile memory by the central processing unit.
    Type: Grant
    Filed: May 22, 2008
    Date of Patent: April 10, 2012
    Assignee: Eliposki Remote Ltd., L.L.C.
    Inventor: Wolfgang Buhr
  • Patent number: 8150038
    Abstract: A method of securely storing electronic information includes a step in which target electronically stored information is encrypted with a first encryption key and then partitioned into a first set of encrypted ESI partitions a subset of which is able to reconstruct the unpartitioned encrypted ESI. This first set of encrypted ESI partitions is then encrypted with a first set of user encryption keys to form a first set of user-associated encrypted ESI partitions that are made available to a first set of users. When access to the target electronically stored information is changed, the target electronically stored information is accessed and then re-encrypted with a second encryption key to form a second encrypted ESI. This second encrypted ESI is then partitioned and distributed to a second set of users.
    Type: Grant
    Filed: November 1, 2007
    Date of Patent: April 3, 2012
    Assignee: Oracle America, Inc.
    Inventor: Radia Perlman
  • Patent number: 8151357
    Abstract: An information recording medium manufacturing method includes the steps of: determining an encryption mode of each sector, which serves as an encrypt processing unit; generating encrypted data having different variations by using a plurality of cryptographic keys for a segment portion; generating encrypted data by using a single cryptographic key for a non-segment portion; and recording the encrypted data. In determining the encryption mode, a cryptographic key for each sector is specified on the basis of an auxiliary file including determination information indicating whether each sector is data of a segment portion or data of a non-segment portion and identification information for identifying a segment and a variation associated with the sector if the sector is found to be the data of a segment portion. In generating the encrypted data for the segment portion or for the non-segment portion, the encrypted data is generated by using the specified cryptographic key.
    Type: Grant
    Filed: February 16, 2006
    Date of Patent: April 3, 2012
    Assignee: Sony Corporation
    Inventors: Kenjiro Ueda, Tateo Oishi, Katsumi Muramatsu, Yoshikazu Takashima, Motoki Kato
  • Patent number: 8144868
    Abstract: At a transmitter, a program is encrypting according to a one program key, the program key is encrypted, and the encrypted program, the encrypted program key, and non-encrypted PSI data to a receiver are transmitted. At a receiver, the encrypted program, the encrypted program key, and the non-encrypted PSI data are received, the encrypted program key is decrypted, the encrypted program is located according to the non-encrypted PSI data, and the located encrypted program is decrypted according to decrypted program key.
    Type: Grant
    Filed: January 30, 2006
    Date of Patent: March 27, 2012
    Assignee: Zenith Electronics LLC
    Inventors: Raymond C. Hauge, Richard Lewis, Rudolf Turner
  • Patent number: 8144869
    Abstract: A content protection system prevents illegal key acquisition, without checking uniqueness of device keys. The content protection system includes a key data generation apparatus and a user terminal. The key data generation apparatus converts first key data, which is for using content, based on a predetermined conversion rule, thereby generating second key data, encrypts the second key data using a device key held by valid terminals, and outputs the encrypted key data. The user terminal obtains the encrypted key data, decrypts the encrypted key data using a device key held by the user terminal, thereby generating second key data, converts the second key data based on a re-conversion rule corresponding to the conversion rule, thereby generating the first key data, and uses the content with use of the generated first key data.
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: March 27, 2012
    Assignee: Panasonic Corporation
    Inventors: Toshihisa Nakano, Motoji Ohmori, Natsume Matsuzaki, Makoto Tatebayashi, Naoki Yamamoto, Hideshi Ishihara
  • Publication number: 20120069997
    Abstract: According to one embodiment, an encryption device includes a storage unit, an input unit, first to fourth partial encryption units, a generation unit, and an output unit. The first partial encryption unit calculates first intermediate data from input plain data to store in the storage unit. The generation unit generates a round key, which is used in calculations for the first intermediate data and N-th intermediate data, from the secret key. The second partial encryption unit calculates (i+1)th intermediate data from i-th intermediate data (i is smaller than N) and the round key to store in the storage unit. The third partial encryption unit performs an arithmetic operation including predetermined conversion for mixing the N-th intermediate data, and calculates (N+1)th intermediate data to store in the storage unit. The fourth partial encryption unit obtains encrypted data by performing an arithmetic operation including inverse conversion of the conversion on the (N+1)th intermediate data.
    Type: Application
    Filed: March 17, 2011
    Publication date: March 22, 2012
    Inventors: Takeshi KAWABATA, Hideo Shimizu
  • Patent number: 8134972
    Abstract: A relay gateway apparatus (HandOver-Gateway (HO-GW) is provided between heterogeneous access networks (a WiMAX access network and a UMB access network). The HO-GW performs conversion of a movement control signal (an Inter-Access Gateway (AGW) handover control signal) and relay of communication data. When the relay is performed, user data from a correspondent node (CN) reaches a wireless terminal (mobile node (MN)) through a host agent (HA) of a core network, an access router ASN-GW, the HO-GW, and a base station eBS.
    Type: Grant
    Filed: October 23, 2008
    Date of Patent: March 13, 2012
    Assignee: Hitachi, Ltd
    Inventors: Hitomi Nakamura, Masashi Yano, Koji Watanabe, Naruhito Nakahara, Yosuke Takahashi
  • Patent number: 8130944
    Abstract: A method and apparatus for enabling and/or providing delayed decryption is disclosed. In one embodiment, the method comprises receiving encrypted information and additional information and decrypting the encrypted information, using the additional information, no sooner than a specified time. The additional information includes data indicative of the time.
    Type: Grant
    Filed: November 3, 2004
    Date of Patent: March 6, 2012
    Assignee: Ricoh Co., Ltd.
    Inventors: David G. Stork, Gregory J. Wolff
  • Patent number: 8127148
    Abstract: An information recording/playback device stores beforehand, on a recording medium, secret information in which a writing/reading method thereof cannot be analyzed and which can be read only by a special reading method. The secret information is applied to a key for content encryption or decryption when performing recording or playback of contents on the recording medium, such as music data and image data. The secret information is, for example, a stamper ID. By using the stamper ID as secret information, and a master key and a media key which are distributed in a tree-structure key-distribution system, a content-cryptosystem key is generated. Accordingly, each content is allowed to be used in only an appropriate device in which the special reading method for the secret information can be executed and to which the key is distributed by the tree-structure key-distribution system.
    Type: Grant
    Filed: September 28, 2005
    Date of Patent: February 28, 2012
    Assignee: Sony Corporation
    Inventors: Tomoyuki Asano, Yoshitomo Osawa
  • Patent number: 8127135
    Abstract: A system comprises a first operating environment and a second operating environment. The first and second operating environments exchange information in encrypted form using a shared encryption key (K3). The first and second operating environments cooperate to change the encryption key K3 using another shared encryption key (K4). The encryption key K4 is changed upon the encryption key K3 being changed.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: February 28, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Wael M. Ibrahim, Lan Wang, Jennifer E. Rios, Valluddin Y. Ali, Manuel Novoa
  • Patent number: 8117464
    Abstract: A network storage server receives write requests from clients via a network and internally buffers data blocks written by the write requests. At a consistency point, the storage server commits the data blocks to nonvolatile mass storage. In the consistency point process, a storage operating system in the network storage server compresses the data blocks, encrypts selected data blocks, and stores the compressed and (possibly) encrypted data blocks in the nonvolatile mass storage facility. Data blocks can also be fingerprinted in parallel with compression and/or encryption, to facilitate deduplication. Data blocks can be indexed and classified according to content or attributes of the data. Encryption can be applied at different levels of logical container granularity, where a separate, unique cryptographic key is used for each encrypted data container. To facilitate deduplication, the system creates an additional, shared encryption key for each data block duplicated between two or more logical containers.
    Type: Grant
    Filed: April 30, 2008
    Date of Patent: February 14, 2012
    Assignee: NetApp, Inc.
    Inventor: Christoph Kogelnik
  • Patent number: 8116457
    Abstract: Methods, systems, apparatuses and products are disclosed for providing security circuits. Exemplary embodiments including semiconductor chips on circuit boards are shown, together with application in a movie stick/movie player pair. Such systems provide for and improve on the means for clocked logic security support beyond what is available in current security products while being capable of embodiment in low cost technologies such as programmable gate arrays.
    Type: Grant
    Filed: March 2, 2011
    Date of Patent: February 14, 2012
    Assignee: OFID Microdevices Inc.
    Inventor: Philip Sydney Langton
  • Patent number: 8116455
    Abstract: A system and method provides for secure initialization and booting of a security appliance. The security appliance cooperates with a “smart” system card to provide cryptographic information needed to boot the security appliance in accordance with a secure boot procedure. The initialization procedure commences once the security appliance detects the presence of the smart card. The smart card and an encryption processor perform an authentication and key exchange procedure to establish a secure communication channel between them. The system card then loads a twice wrapped master key from a configuration database and decrypts the master key using a key associated with the system card. The wrapped master key is then forwarded via the secure communication channel to the encryption processor, which decrypts the wrapped key using a key associated therewith and enters an operating state using the decrypted master key.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: February 14, 2012
    Assignee: NetApp, Inc.
    Inventors: Robert Jan Sussland, Ananthan Subramanian, Lawrence Wen-Hao Chang
  • Publication number: 20120027212
    Abstract: The invention relates to a security module comprising an interface (596) for receiving a first key of a first chain (400) and a second key of a second chain (402), wherein a predecessor key can be calculated from each successor key of the first chain by applying a first function, wherein the first function is a one-way function, wherein the second chain can be determined by iteratively applying a second function, wherein the second function is a one-way function, a processor (569) for executing program instructions (555), wherein, by executing the program instructions, the first keys of a first partial chain (408, 408?, . . . ) of the first chain are calculated by iteratively applying the first function beginning with the received first key, and second keys of a second partial chain (410, 410?, . . . ) of the second chain are calculated by iteratively applying the second function beginning with the received second key, and a partial chain (406, 406?, . . .
    Type: Application
    Filed: May 4, 2009
    Publication date: February 2, 2012
    Applicant: SECUTANTA GMBH
    Inventor: Christoph Ruland
  • Patent number: 8107628
    Abstract: A data communication apparatus, performing a secret communication, is provided to reduce a random number generation speed using a plurality of random number generators. The data communication apparatus includes random number generation sections generating random numbers, which are each a multi-level pseudo random number, using predetermined key information includes a multi-level signal modulation section selecting a level, from among multi-levels previously prepared, selected level corresponding to information data and a multi-level sequence, which is composed of a combination of values of the random numbers and generating a multi-level modulated signal including a noise having a predetermined noise level using the selected level. Levels of a multi-level signal are in a range of the noise level, and a signal point allocation is set such that all values which are possibly taken by each of the random numbers are allocated to the plurality of levels of the multi-level signal.
    Type: Grant
    Filed: May 27, 2008
    Date of Patent: January 31, 2012
    Assignee: Panasonic Corporation
    Inventors: Tsuyoshi Ikushima, Masaru Fuse, Satoshi Furusawa, Tomokazu Sada
  • Patent number: 8103883
    Abstract: A method, system, and computer-readable storage medium containing instructions for controlling access to data stored on a plurality of storage devices associated with a first platform. The method includes authenticating a user to access the first platform, wherein the first platform includes first and second storage devices, chipset encryption hardware, and a memory. Data stored on the storage devices are encrypted, with first data on the first storage device being encrypted by the chipset encryption hardware and second data stored on the second storage device being encrypted by another encryption mechanism. The data are decrypted and the user is allowed to access the first data and the second data.
    Type: Grant
    Filed: December 31, 2008
    Date of Patent: January 24, 2012
    Assignee: Intel Corporation
    Inventor: Ned Smith
  • Patent number: 8095790
    Abstract: A recording/playback apparatus for recording or playing back content is provided. For example, a playback unit plays back a medium on which an encrypted content management unit and an encrypted unit key for encrypting the content management unit are recorded. The encrypted unit key is decrypted according to a predetermined decryption procedure. An obtaining unit obtains subsequently generated or obtained data corresponding to the content data played back by the playback unit and a subsequently generated or obtained data key. A decryption unit decrypts the subsequently generated or obtained data key obtained by the obtaining unit according to the predetermined decryption procedure for decrypting the encrypted unit key to decrypt the subsequently generated or obtained data based on the decrypted subsequently generated or obtained data key.
    Type: Grant
    Filed: February 8, 2006
    Date of Patent: January 10, 2012
    Assignee: Sony Corporation
    Inventor: Yoshikazu Takashima
  • Patent number: 8094817
    Abstract: An authentication server and a system and method for managing cryptographic keys across different combinations of user terminals, access networks, and core networks. A Transformation Coder Entity (TCE) creates a master key (Mk), which is used to derive keys during the authentication procedure. During handover between the different access types, the Mk or a transformed Mk is passed between two nodes that hold the key in the respective access networks when a User Equipment (UE) terminal changes access. The transformation of the Mk is performed via a one-way function, and has the effect that if the Mk is somehow compromised, it is not possible to automatically obtain access to previously used master keys. The transformation is performed based on the type of authenticator node and type of UE/identity module with which the transformed key is to be utilized. The Mk is never used directly, but is only used to derive the keys that are directly used to protect the access link.
    Type: Grant
    Filed: September 19, 2007
    Date of Patent: January 10, 2012
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Rolf Blom, Karl Norrman, Mats Naslund
  • Patent number: 8090106
    Abstract: A multi-level data encryption and decryption system and a method thereof are provided. The method includes dividing a data into a plurality of sub-data blocks corresponding to a plurality of user levels. The method also includes generating an encryption key for each level according to a level generation key and a time key of the level and encrypting the sub-data block of each level by using the encryption key of the level, wherein the level generation key and the time key of a lower level are generated based on the same of an upper level, the time key is generated according to a time generation key and a time seed, and the time seed is periodically updated according to different encryption periods. Thereby, the number of keys to be managed by a user is reduced while the read rights of different users are managed with forward and backward data security.
    Type: Grant
    Filed: September 30, 2008
    Date of Patent: January 3, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Po-Yuan Teng, Shih-I Huang
  • Patent number: 8090101
    Abstract: A method and system for generating a secret key from joint randomness shared by wireless transmit/receive units (WTRUs) are disclosed. A first WTRU and a second WTRU perform channel estimation to generate a sampled channel impulse response (CIR) on a channel between the first WTRU and the second WTRU. The first WTRU generates a set of bits from the sampled CIR and generates a secret key and a syndrome, (or parity bits), from the set of bits. The first WTRU sends the syndrome, (or parity bits), to the second WTRU. The second WTRU reconstructs the set of bits from the syndrome, (or parity bits), and its own sampled CIR, and generates the secret key from the reconstructed set of bits.
    Type: Grant
    Filed: December 19, 2006
    Date of Patent: January 3, 2012
    Assignee: InterDigital Technology Corporation
    Inventors: Chunxuan Ye, Alexander Reznik, Yogendra Shah, Gregory S. Sternberg
  • Patent number: 8090100
    Abstract: A storage apparatus, which controls the input and output of data to and from a computer, includes a logical volume for storing data from the computer, a common resource for storing data pre-stored in the logical volume as update data in order to store subsequent data from the computer in the logical volume, an encryption/decryption unit for encrypting or decrypting data stored in the logical volume or update data stored in the common resource, and a key change unit for changing a key for encrypting or decrypting data stored in the logical volume. The storage apparatus changes the key for encrypting or decrypting update data stored in the common resource based on information of the key used for data stored in the logical volume.
    Type: Grant
    Filed: January 18, 2008
    Date of Patent: January 3, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Daisuke Kito, Kenji Fujii, Manabu Kitamura
  • Patent number: 8077871
    Abstract: A content processing apparatus includes a read unit which reads encrypted key information from a recording medium, a decryption unit which decrypts the encrypted key information with a device key and dynamic information to obtain key information containing content keys, an update unit which updates the dynamic information, a key information processing unit which updates the key information by extracting a content key corresponding to a move target content from the key information, and removing the content key from the key information, a first encryption unit which encrypts the updated key information with the device key and the updated dynamic information, a second encryption unit which encrypts the content key with a shared key, and a write unit which overwrites the updated encrypted key information on the encrypted key information in the medium and writes the encrypted content key in the medium.
    Type: Grant
    Filed: March 25, 2008
    Date of Patent: December 13, 2011
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Taku Kato
  • Patent number: 8059814
    Abstract: A technique carries out seed (or key) derivation within an electronic apparatus (e.g., a hand holdable electronic apparatus such as a token, an authentication server, etc.). The technique involves acquiring a stored representation of a derived seed, the stored representation of the derived seed resulting from an earlier-performed cryptographic operation based on a higher-level seed. The technique further involves (i) performing a current cryptographic operation based on a stored representation of the higher-level seed, the current cryptographic operation resulting in a current representation of the derived seed, and (ii) providing a corruption detection signal indicating whether the current representation of the derived seed matches the stored representation of the derived seed.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: November 15, 2011
    Assignee: EMC Corporation
    Inventor: William M. Duane
  • Patent number: 8045714
    Abstract: Systems and methods for managing multiple keys for file encryption and decryption may provide an encrypted list of previously used keys. The list itself may be encrypted using a current key. To decrypt files that are encrypted in one or more of the previous keys, the list can be decrypted, and the appropriate previous key can be retrieved. To re-key files, an automated process can decrypt any files using previous keys and encrypt them using the current key. If a new current key is introduced, the prior current key can be used to decrypt the list of keys, the prior current key can be added to the list, and the list can be re-encrypted using the new current key.
    Type: Grant
    Filed: February 7, 2005
    Date of Patent: October 25, 2011
    Assignee: Microsoft Corporation
    Inventors: David B. Cross, Duncan G. Bryce, Jianrong Gu, Kelvin Shek Yiu, Monica Ioana Ene-Pietrosanu
  • Patent number: 8045705
    Abstract: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that reduces the overall number of doubling and addition operations thereby providing an efficient method for multiple scalar multiplication. The elements in the pairs for P and Q method are combined into a single pair, and the bits in k and s are evaluated at each step as bit pairs. When the bits in k and s are equal, only one doubling operation and one addition operation are needed to compute the current pair, and when the bits in k and s are not equal, only one doubling operation is needed and two addition operations.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: October 25, 2011
    Assignee: Certicom Corp.
    Inventors: Adrian Antipa, Yuri Poeluev
  • Patent number: 8031867
    Abstract: The method of verifying the integrity of an encryption key (K) obtained by combining at least two key portions (KM, M) in a protected zone (3) by using a commutative operator, comprises the steps of: using the commutative operator to perform a first combination between a key portion (KM) and a verification encryption key (Kv); using the commutative operator to perform in succession a combination between a key portion that has not yet been combined and a result obtained by an immediately preceding combination, until a last combination (Mv) is performed that includes all of the key portions; performing a combination in the protected zone (3) between the encryption key (K) to be verified and the last combination (Mv) of the verification encryption key (Kv) and the key portions (KM, M) in order to obtain a final verification key (Kf); encrypting verification data (Dv) by means of a symmetrical encryption algorithm (DES) using the final verification key (Kf); and making a comparison with a verification encryption
    Type: Grant
    Filed: August 7, 2007
    Date of Patent: October 4, 2011
    Assignee: MORPHO
    Inventor: Hervé Pelletier
  • Patent number: 8024566
    Abstract: A system is described in which similar session objects are managed within session domains. In addition, in one embodiment, a persistence storage interface is employed which maps each session domain to a table within a relational database or other persistent storage implementation.
    Type: Grant
    Filed: April 29, 2005
    Date of Patent: September 20, 2011
    Assignee: SAP AG
    Inventor: Georgi Stanev
  • Patent number: 8024810
    Abstract: A method and an apparatus ensuring protection of digital data are provided. In addition to re-encrypting the data using an unchangeable key, the data is double re-encrypted using a changeable key. The changeable key is used first and the unchangeable key is then used, or in another case, the unchangeable key is used first, and the changeable key is then used. In the aspect of embodiments, there is a case adopting a software, a case adopting a hardware, or a case adopting the software and the hardware in combination. The hardware using the unchangeable key developed for digital video is available. In adopting the software, encryption/decryption is performed in a region below the kernel which cannot be handled by the user to ensure the security for the program and for the key used. More concretely, encryption/decryption is performed with RTOS using a HAL and a device driver, i.e., a filter driver, a disk driver and a network driver, in an I/O manager.
    Type: Grant
    Filed: July 3, 2006
    Date of Patent: September 20, 2011
    Assignee: Intarsia Software LLC
    Inventor: Makoto Saito
  • Patent number: 8015416
    Abstract: An information processing apparatus causes an encryption key data generating section to generate key data stored in a semiconductor memory by using encryption key source data read from the semiconductor memory and cipher generation data stored therein, and stores the key data in a temporary storage section. The information processing apparatus transmits data encrypted by an encryption circuit by using the key data. Upon receipt of the encrypted data, the semiconductor memory executes a command decrypted by a decryption circuit similarly using the key data. This achieves data communication only between the predetermined semiconductor memory and the information processing apparatus.
    Type: Grant
    Filed: August 16, 2005
    Date of Patent: September 6, 2011
    Assignees: Megachips Corporation, Nintendo Co., Ltd.
    Inventors: Takanobu Nakashima, Takashi Oshikiri
  • Patent number: 8009831
    Abstract: A method for hiding the decryption key in a dispersive way is disclosed. A decryption key corresponding to content to be accessed is decomposed into at least two partial decryption keys, comprising first partial decryption key and second partial decryption key. The first partial decryption key is stored in a memory device. The second partial decryption key is stored in a hidden area of the memory device. When the memory device is installed on an electronic device, an application installed in the electronic device is activated. The application retrieves the first partial decryption key from the memory device and the second partial decryption key from the hidden area of the memory device, re-organizes and codes the first and second partial decryption keys to recover the decryption key, and decrypts the content using the decryption key, enabling the electronic device to access the content.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: August 30, 2011
    Assignee: Condel International Technologies Inc.
    Inventors: Chi-Yang Chou, Pei-Yen Chou, Yeu-Chung Lin
  • Patent number: 8010804
    Abstract: A method, system, and computer-usable medium are disclosed for controlling unauthorized access to encrypted application program code. Predetermined program code is encrypted with a first key. The hash value of an application verification certificate associated with a second key is calculated by performing a one-way hash function. Binding operations are then performed with the first key and the calculated hash value to generate a third key, which is a binding key. The binding key is encrypted with a fourth key to generate an encrypted binding key, which is then embedded in the application. The application is digitally signed with a fifth key to generate an encrypted and signed program code image. To decrypt the encrypted program code, the application verification key certificate is verified and in turn is used to verify the authenticity of the encrypted and signed program code image. The encrypted binding key is then decrypted with a sixth key to extract the binding key.
    Type: Grant
    Filed: August 8, 2008
    Date of Patent: August 30, 2011
    Assignee: International Business Machines Corporation
    Inventors: Masana Murase, Kanna Shimizu, Wilfred Edmund Plouffe, Jr.
  • Patent number: 8001387
    Abstract: In one embodiment, a storage device with biometric access includes: a biometric scanner adapted to scan a biological feature of a user to provide a corresponding extracted biometric template; and a storage engine adapted to retrieve an encrypted biometric template from a storage medium and to retrieve a corresponding encrypted content key from the storage medium. The storage engine generates a first key and combines the first key with a media identifier from the storage medium to provide a content key. Using the content key, the storage engine decrypts the retrieved encrypted biometric template. If the extracted biometric template matches the retrieved biometric template, the storage engine grants a user access to content on the storage medium.
    Type: Grant
    Filed: April 19, 2006
    Date of Patent: August 16, 2011
    Assignee: DPHI, Inc.
    Inventors: Lane W. Lee, Mark J. Gurkowski, David H. Davies
  • Patent number: 8000472
    Abstract: The present invention stores and manages only one piece of key information even if contents information includes a plurality of partial contents arranged in a sequence, and the partial contents are encrypted with different keys. When a piece of contents information includes four partial contents or divided into four partial contents, a key for each of four node positions is generated through four steps of operations from a key for the top root. Node keys P (i, 1) and P (i, i) at both sides are generated by a one-way function from node keys P (i?1, 1) and P (i?1, i?1) at the upper i?1th layer, and a node key P (i, m) (m=2, 3, . . . , i?1) are generated by a one-way function which can generate the keys from any of node keys P (i?1, m?1) and P (i?1, m) at the upper i?1th layer, where jth node key at the ith layer is represented as P (i, j) (j=1, 2, . . . , i?1). Then, each of partial contents is encrypted with key information generated at a terminal layer.
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: August 16, 2011
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yuji Suga
  • Patent number: 8000471
    Abstract: In an iterated block cipher, a method for round key encryption and key generation, the method including providing a first function Fi and a second function Fj, providing a round key generation function, the round key generation function being operative to utilize, in any given round, exactly one of the first function Fi, and the second function Fj, providing a round mixing function, the round mixing function being operative to utilize, in any given round, exactly one of the first function Fi, and the second function Fj, utilizing the round key generation function in at least a first round to generate a second round key for use in a second round, and utilizing the round mixing function in at least the first round to mix a first round key with a cipher state, wherein one of the following is performed in the first round the round key generation function utilizes the first function Fi to generate the second round key for use in the second round, substantially simultaneously with the round key mixing function util
    Type: Grant
    Filed: March 20, 2007
    Date of Patent: August 16, 2011
    Assignee: NDS Limited
    Inventors: Itsik Mantin, Aharon Grabovsky