User-to-user Key Distributed Over Data Link (i.e., No Center) Patents (Class 380/283)
  • Patent number: 8473741
    Abstract: The present disclosure is directed to systems and methods including accessing a first private value, generating a first intermediate value based on the first private value, receiving a second intermediate value that is based on a second private value, generating a first comparison value based on the second intermediate value, receiving over the network a second comparison value that is based on the first intermediate value, comparing the first comparison value and the second comparison value to generate a result, and displaying the result, the result indicating that the first private is greater than the second private value when the first comparison value is less than the second comparison value, and the result indicating that the first private value is less than or equal to the second private value when the first comparison value is greater than the second comparison value.
    Type: Grant
    Filed: May 3, 2010
    Date of Patent: June 25, 2013
    Assignee: SAP AG
    Inventor: Florian Kerschbaum
  • Patent number: 8462942
    Abstract: An approach is provided for providing secure packetized voice transmissions. A public/private key pair is generated at a call device (or endpoint). An encrypted voice stream is received from another call device, where the encrypted voice stream was encrypted using a public key of the public/private key pair. This encrypted voice stream when received at the call device is decrypted using a private key of the public/private key pair.
    Type: Grant
    Filed: August 17, 2009
    Date of Patent: June 11, 2013
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: David E. Berggren, Steven E. Belczyk
  • Patent number: 8458806
    Abstract: Systems and methods for wirelessly exchanging an encryption key between a first device and a second device are disclosed herein.
    Type: Grant
    Filed: September 19, 2011
    Date of Patent: June 4, 2013
    Assignee: Research In Motion Limited
    Inventor: Vahid Moosavi
  • Patent number: 8452017
    Abstract: Methods and systems for secure channel initialization transaction security between a client network element and a server network element are disclosed.
    Type: Grant
    Filed: December 21, 2007
    Date of Patent: May 28, 2013
    Assignee: Research In Motion Limited
    Inventor: Alexander Sherkin
  • Patent number: 8447978
    Abstract: A wireless communication method includes receiving a first frame requesting to start a registration protocol in Wi-Fi protected setup (WPS) of wireless LAN security standards, transmitting, after receiving the first frame, a second frame containing security types and encryption keys for the respective security types, and transmitting a third frame, after transmitting the second frame, the third frame instructing to terminate WPS. The security types include at least one of Wi-Fi protected access (WPA), WPA2 and WEP.
    Type: Grant
    Filed: November 2, 2009
    Date of Patent: May 21, 2013
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Youichirou Shiba
  • Publication number: 20130108046
    Abstract: Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device, biological data; utilizing the biological data, at the implantable medical device, to generate a public cryptographic key; and utilizing the public cryptographic key, at the implantable medical device, to generate a private cryptographic key.
    Type: Application
    Filed: October 31, 2011
    Publication date: May 2, 2013
    Inventor: Dean P. ANDERSEN
  • Patent number: 8423794
    Abstract: A secure flash memory card or flash drive protects user content from unauthorized duplication. However, even the protected user content can be moved from one flash card or drive to another by its rightful owner or licensee. Additionally, secure firmware applications that may be added to the flash card over time in order to add additional functionality to the card may also be moved, although many of them are device specific and also designed to only operate on one particular piece of hardware.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: April 16, 2013
    Assignee: SanDisk Technologies Inc.
    Inventors: Michael Holtzman, Fabrice Jogand-Coulomb
  • Patent number: 8423510
    Abstract: This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user's actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant the remote server generates and downloads the same files that are downloaded on the local user computer devices.
    Type: Grant
    Filed: April 12, 2011
    Date of Patent: April 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Dimitri Kanevsky, Alexander Zlatsin
  • Publication number: 20130089207
    Abstract: Digital rights management (DRM) can be implemented through use of an anchor point based digital rights management system. In one embodiment, a device may comprise an anchor point circuit including a memory and a processor. The processor may be configured to receive a title key from a digital content provider, the title key used to encrypt a digital property to produce an encrypted digital property. The processor may be further configured to generate a binding key, encrypt the title key with the binding key to produce a title pre-key, and store the binding key in the memory. In another embodiment a system may comprise an interface configured to communicate with a content provider, and an anchor point circuit configured to bind a digital property received from the content provider to the anchor point circuit such that the digital property can only be used in conjunction with the anchor point circuit.
    Type: Application
    Filed: November 27, 2012
    Publication date: April 11, 2013
    Applicant: SEAGATE TECHNOLOGY LLC
    Inventor: Paul Marvin Sweazy
  • Patent number: 8401196
    Abstract: A method and apparatus for performing Joint Randomness Not Shared by Others (JRNSO) is disclosed. In one embodiment, JRNSO is determined in Frequency Division Duplex (FDD) using a baseband signal loop back and private pilots. In another embodiment, JRNSO is determined in Time Division Duplex (TDD) using a baseband signal loop back and combinations of private pilots, private gain functions and Kalman filtering directional processing. In one example, the FDD and TDD JRSNO embodiments are performed in Single-Input-Single-Output (SISO) and Single-Input-Multiple-Output (SIMO) communications. In other examples, the FDD and TDD embodiments are performed in Multiple-Input-Multiple-Output (MIMO) and Multiple-Input-Single-Output (MISO) communications. JRNSO is determined by reducing MIMO and MISO communications to SISO or SIMO communications. JRNSO is also determined using determinants of MIMO channel products. Channel restrictions are removed by exploiting symmetric properties of matrix products.
    Type: Grant
    Filed: April 21, 2008
    Date of Patent: March 19, 2013
    Assignee: InterDigital Technology Corporation
    Inventors: Steven J. Goldberg, Yogendra C. Shah, Alexander Reznik
  • Patent number: 8401588
    Abstract: A dual mode human interface device (HID) includes a wireless interface for wireless communication with a host computer; a wired interface for wired communication with the host computer; and a processor coupled with the wireless interface and the wired interface for transferring data between the HID and the host computer, wherein the processor initiates establishing wireless communication with the host computer, when the HID is connected to the host computer via the wired interface.
    Type: Grant
    Filed: October 27, 2005
    Date of Patent: March 19, 2013
    Assignee: Broadcom Corporation
    Inventors: Muhammad Farooq Hameed, Brian Jason Tietz, Robert William Hulvey
  • Patent number: 8397083
    Abstract: A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a plurality of files, each of which stores an associated file key within a special metadata portion of the file. Notably, special metadata is created by a security appliance coupled to the storage system and attached to each file to thereby create two portions of the file: the special metadata portion and the main, “file data” portion. The security appliance then stores the file key within the specially-created metadata portion of the file. A cryptainer key is associated with the cryptainer. Each file key is used to encrypt the file data portion within its associated file and the cryptainer key is used to encrypt the part of the special metadata portion of each file. To delete the file from the cryptainer, the file key of the file is deleted and the special metadata portions of all other files stored in the cryptainer are re-keyed using a new cryptainer key.
    Type: Grant
    Filed: August 23, 2006
    Date of Patent: March 12, 2013
    Assignee: NetApp, Inc.
    Inventors: Robert Jan Sussland, Lawrence Wen-Hao Chang, Ananthan Subramanian
  • Patent number: 8392684
    Abstract: A network memory system for ensuring compliance is disclosed. The network memory system comprises a first appliance configured to encrypt first data, store the encrypted first data in a first memory device. The first appliance also determines whether the encrypted first data exists in a second appliance and transmits a store instruction comprising the encrypted first data based on the determination that the encrypted first data does not exist in the second appliance. The second appliance is further configured to receive a retrieve instruction comprising an index at which the encrypted first data is stored, process the retrieve instruction to obtain encrypted response data, and decrypt the encrypted response data.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: March 5, 2013
    Assignee: Silver Peak Systems, Inc.
    Inventor: David Anthony Hughes
  • Patent number: 8379866
    Abstract: A method of distributing an encoding/decoding program and a symmetric key in a security domain environment, and a device divider and data injector therefor are provided. The method includes selecting, at a highest-level security domain, an encoding/decoding program and a symmetric key to be distributed to a plurality of lower-level security domains; dividing the selected encoding/decoding program and the symmetric key into pieces as many as the number of lower-level security domains; and distributing the divided encoding/decoding program pieces and the symmetric key pieces to devices belonging to the lower-level security domains.
    Type: Grant
    Filed: September 8, 2009
    Date of Patent: February 19, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jin Seok Yang, Young Seok Chung, Chang Su Hong, Jung Woo An, Jong Jin Won, Jong Cheol Moon
  • Patent number: 8369518
    Abstract: An object of the present invention is to provide an electronic data encryption and decryption system allowing a privileged user to decrypt all encrypted data without using a plurality of secret keys but only by using a single secret key that the privileged user himself has. An electronic data encryption and decryption system includes: a privileged user device, a user device, and an encrypted data generation device. The privileged user device has: a privileged user key generation means for generating a privileged user secret key x and a privileged user public key x·P (P is a generator); a first session key generation means for generating a session key K; and a first decryption means for decrypting the encrypted data by using the session key K generated by the first session key generation means.
    Type: Grant
    Filed: June 18, 2008
    Date of Patent: February 5, 2013
    Assignee: NEC Corporation
    Inventor: Norikazu Kubotera
  • Patent number: 8369530
    Abstract: A network device adapted to communicate with other devices over a network, the device being arranged to, when the device is connected to a physical data carrier, automatically store a representation of a security key on the data carrier, and to provide at least one service over the network only to other devices making use of the security key.
    Type: Grant
    Filed: November 8, 2007
    Date of Patent: February 5, 2013
    Assignee: GS IP, Limited Liability Company
    Inventor: Robert Macaulay
  • Patent number: 8369527
    Abstract: A multicast host for communicating information published about any one of a set of topics to one or more authorised subscribers to those topics, the set of topics being partitioned into one or more partition elements, each partition element having a partition element encryption key associated therewith, wherein each of the one or more partition elements is a disjoint proper subset of the set of topics, the host comprising: means for receiving information relating to a topic; means for determining a partition element for the topic; means for retrieving a partition element encryption key associated with the partition element; means for encrypting the information with the retrieved partition element encryption key; and means for communicating the information to the one or more authorised subscribers.
    Type: Grant
    Filed: June 22, 2005
    Date of Patent: February 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Boaz Carmeli, John Justin Duigenan, Michael Damein Elder, Gidon Gershinsky
  • Patent number: 8345882
    Abstract: To safeguard data transmission, a first terminal communicates in a first network with the aid of at least one session key and a second terminal communicates in a second network with the aid of at least one session key. The first terminal is connected to the second terminal through a local interface. In the first terminal, at least one first session key is determined and at least one second session key is derived from the first session keys. At least one second session key is transmitted to the second terminal through the local interface by a safety protocol. The second terminal is authenticated to the second network by at least one second session key or by the key derived from the second session key(s) through an authentication protocol.
    Type: Grant
    Filed: November 10, 2004
    Date of Patent: January 1, 2013
    Assignee: Siemens Aktiengesellschaft
    Inventor: Günther Hom
  • Patent number: 8345861
    Abstract: A method and system for distributing a secret are described. In one embodiment, the secret is represented by a secret polynomial of degree d over GF(q) constructed with a prime or a power of a prime. The secret polynomial is then embedded into an extension polynomial of degree m that is greater than d. The extension polynomial is divided by n coprime divisor polynomials over GF(q), using arithmetic defined for polynomials over GF(q), to generate n shares of the secret. Each share includes one of the divisor polynomials and a corresponding remainder. These n shares are distributed among a plurality of cooperating entities for secret sharing.
    Type: Grant
    Filed: August 22, 2008
    Date of Patent: January 1, 2013
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8345877
    Abstract: In a transmitter, data is encrypted by use of a data key, the data key is encrypted based on a first modification key, and the first modification key is encrypted based on a second modification key such that the first and second modification keys are different keys. The encrypted data, the encrypted data key, and the encrypted first modification key are transmitted to a receiver. In the receiver, the encrypted first modification key, the encrypted data key, and the encrypted data are received from the transmitter. The encrypted first modification key is decrypted based on the second modification key, the encrypted data key is decrypted based on the decrypted first modification key, and the encrypted data is decrypted by use of the decrypted data key.
    Type: Grant
    Filed: November 20, 2009
    Date of Patent: January 1, 2013
    Assignee: Zenith Electronics LLC
    Inventors: Raymond C. Hauge, Richard Lewis
  • Publication number: 20120328106
    Abstract: Methods, devices, systems and computer program products are provided to facilitate cryptographically secure retrieval of secret information that is embedded in a device. The embedded secret information can include a random number that is not custom-designed for any specific requestor of the secret information. Upon receiving a request for the embedded secret information, an encrypted secret is provided to the requestor that enables the recovery of the embedded secret information by only the requestor. Moreover, a need for maintenance of a database of the embedded secret information and the associated requestors is eliminated.
    Type: Application
    Filed: June 24, 2011
    Publication date: December 27, 2012
    Applicant: BROADCOM CORPORATION
    Inventor: Andrew Dellow
  • Patent number: 8340296
    Abstract: Disclosed herein is a method and system for registering and verifying a smart card certificate for users moving between public key infrastructure domains, which allows a user moving between domains to have a smart card certified in a terminal located in an external domain other than a home domain. According to the present invention, when a user wants his/her own smart card to be certified in a terminal of an external domain, a certification authority of the external domain can certify the smart card using a certificate stored in the smart card and signed electronically by a certification authority of a home domain. Additionally, a new certificate issued by the certification authority of the external domain is stored in the certified smart card, so that a certificate of the moving user can be verified regardless of domains and a new certificate of a moved domain can be easily obtained.
    Type: Grant
    Filed: January 20, 2004
    Date of Patent: December 25, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Byung-rae Lee, Kyung-ah Chang
  • Patent number: 8335919
    Abstract: Secure bulk messaging mechanism in which, roughly described, a sender first encrypts a message once. The message can be decrypted with a message decryption key. These can be symmetric or asymmetric keys. For each recipient, the sender then encrypts the message decryption key with the recipient's public key. The sender then sends the encrypted message and the encrypted message decryption keys to a store-and-forward server. Subsequently, one or more recipients connect to the server and retrieve the encrypted message and the message encryption key that has been encrypted with the recipient's public key. Alternatively, the server can forward these items to each individual recipient. The recipient then decrypts the encrypted message decryption key with the recipient's private key, resulting in an un-encrypted message decryption key. The recipient then decrypts the message using the un-encrypted message decryption key.
    Type: Grant
    Filed: April 15, 2005
    Date of Patent: December 18, 2012
    Assignee: Axway Inc.
    Inventor: David Jevans
  • Publication number: 20120314865
    Abstract: NFC communication is utilized to provide methods, apparatus and systems for increasing the security of cryptographic keys and cryptographic processes. For the encryption and decryption of a message, public key cryptography requires the use of a pair of keys, i.e., the public key and the private key. Various embodiments of the present invention provide storage of information needed for one or more aspects of encrypting and/or decrypting messages, wherein that information is made available through an NFC communications interface. An NFC-enabled device is brought into physical proximity with a computational platform that is executing, or otherwise providing access to, an email client. Once the NFC-enabled device and the computational platform are within NFC communication range of each other, transfer of information needed to set up an encryption and/or decryption process takes place.
    Type: Application
    Filed: June 21, 2011
    Publication date: December 13, 2012
    Applicant: Broadcom Corporation
    Inventor: Robert KITCHEN
  • Patent number: 8327129
    Abstract: The present invention discloses a method, an apparatus, and a system for IKE negotiation. One method comprises: upon receiving a data packet, selecting one of multiple service cards according to a pre-configured policy and triggering the service card to send an IKE negotiation packet; and saving the mapping between the IKE negotiation packet and the service card. The other method comprises: upon receiving an IKE negotiation packet, selecting one of multiple service cards according to a pre-configured policy, triggering the service card to perform IKE negotiation, and saving the mapping between of the IKE negotiation packet and the service card. The solution enables a network node a node to distribute IKE negotiations to different service cards to perform IKE negotiation at the same time, improving IKE negotiation speed.
    Type: Grant
    Filed: June 23, 2008
    Date of Patent: December 4, 2012
    Assignee: Hangzhou H3C Technologies Co., Ltd.
    Inventors: Weichen Ren, Xudong Zou, Zhanming Wei, Xiangqing Chang
  • Patent number: 8321680
    Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.
    Type: Grant
    Filed: December 9, 2010
    Date of Patent: November 27, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Aram Perez, Gregory G. Rose, Laurence G. Lundblade, Matthew W. Hohfeld, Michael W. Paddon, Oliver Michaelis, Ricardo Jorge Lopez
  • Patent number: 8316234
    Abstract: A first communication device (“FCD”) is adapted to communicate with a second communication device. The FCD obtains a first key, encodes an attribute in the FCD with the first key to produce a first encoded value, and transmits the first encoded value to the second communication device. The FCD also receives a second encoded value from the second communication device. The second encoded value comprises an attribute stored in the second communication device that has been encoded with a second key. Further, the FCD encodes the second encoded value with the first key to produce a third encoded value, transmits the third encoded value to the second communication device, and receives a fourth encoded value from the second communication device. The fourth encoded value comprises the first encoded value after being encoded by the second key. The FCD determines whether the third encoded value matches the fourth encoded value.
    Type: Grant
    Filed: October 28, 2003
    Date of Patent: November 20, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Bernardo A. Huberman, Stephen P. Sorkin, Joshua R. Tyler
  • Patent number: 8316221
    Abstract: A method and a system for personalizing electronic elements, by replacing, in a non-volatile memory of each of the electronic elements a first secret key with a second secret key, by a secure authentication module automatically generating the second key after having restored the first one from an identifier of the element being personalized, including conditioning, on the authentication module side, the provision of the second key to a current element to the reception of a message confirming the key replacement of at least one preceding element.
    Type: Grant
    Filed: July 22, 2005
    Date of Patent: November 20, 2012
    Assignee: Proton World International N.V.
    Inventors: Joan Daemen, Thierry Huque, Paul Fontaine
  • Patent number: 8315393
    Abstract: A secure communication system wherein message decryption may be performed while off-line, or optionally while on-line. A sender encrypts a message based on the message key and sends it to the recipient. An envelope containing a message key is created by encrypting the message key based on a verifier, where the verifier is based on a secret of the recipient. The recipient is provided the envelope, along with the message or separately, from the sender or from another party, contemporaneous with receipt of the message or otherwise. The recipient can then open the envelope while off-line, based on their secret, and retrieve the message key from the envelope to decrypt the message. In the event the recipient cannot open the envelope, optional on-line access permits obtaining assistance that may include obtaining an alternate envelope that the recipient can open.
    Type: Grant
    Filed: July 20, 2010
    Date of Patent: November 20, 2012
    Assignee: Proofpoint, Inc
    Inventors: Jahanshah Moreh, Logan O'Sullivan Bruns
  • Patent number: 8316461
    Abstract: Provided is a method for delivering all or part of a rights object (RO) of a user associated with the content to other users. The method includes creating a rights object to be transmitted to a second user within a limit of the rights object held by the first user, and forwarding the created rights object to the second user. The method allows each user to share its own RO with other users within the limit of the RO without server authentication.
    Type: Grant
    Filed: October 14, 2009
    Date of Patent: November 20, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Kyung-ah Chang, Byung-rae Lee
  • Patent number: 8311214
    Abstract: Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve and a public key Q (416) of the receiver. The cipher includes a first element that is the product kP of a random number k (404) with the generator point P and a second element that is the product of m and the x-coordinate of the product kQ. The message m is generated from two mathematically independent representations of the information and, optionally, a random number. The cipher is communicated to the receiver and decoded to recover a message m? (502). A validation token (500) is generated by the receiver and passed to the transmitter, which validates communication of the information to the receiver if the product mkQ is equal to the validation token.
    Type: Grant
    Filed: April 24, 2006
    Date of Patent: November 13, 2012
    Assignee: Motorola Mobility LLC
    Inventors: Ronald F. Buskey, Barbara B. Frosik, Douglas A. Kuhlman
  • Patent number: 8307211
    Abstract: A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme.
    Type: Grant
    Filed: September 28, 2010
    Date of Patent: November 6, 2012
    Assignee: Certicom Corp.
    Inventor: Scott Alexander Vanstone
  • Publication number: 20120272056
    Abstract: To provide key management layered on a quasi-out-of-band authentication system, a security server receives a request for activation of a user interface window for a particular user from a network device via a communication channel. It then transmits an activation PIN to an out of band authentication system for forwarding to the user's telephone via a voice or text message. It next receives the previously transmitted PIN from the network device via the communication channel, and authenticates the user based on the received PIN. After authenticating the user, it establishes a secure, independent, encrypted communication channel between the user interface window and the security server on top of the original communication channel. It then generates and transmits to the user interface window and/or receives from the user interface window via the secure communication channel, key material and certificate material for public key and/or symmetric key cryptography based operations.
    Type: Application
    Filed: April 19, 2011
    Publication date: October 25, 2012
    Applicant: HAWK AND SEAL, INC.
    Inventor: Ravi Ganesan
  • Patent number: 8295487
    Abstract: A method and apparatus for establishing a cryptographic relationship between a first node and a second node in a communications network. The first node receives at least part of a cryptographic attribute of the second node, uses the received at least part of the cryptographic attribute to generate an identifier for the first node. The cryptographic attribute may a public key belonging to the second node, and the identifier may be a Cryptographically Generated IP address. The cryptographic relationship allows the second node to establish with a third node that it is entitled to act on behalf of the first node.
    Type: Grant
    Filed: November 21, 2008
    Date of Patent: October 23, 2012
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Wassim Haddad, Mats Naslund
  • Patent number: 8295480
    Abstract: A recursive based approach to key generation produces keys for encrypted communication. Simple mathematical operations are utilized with the inherent uncertainty of an interactive process between two endpoints to establish a common secret key. The uncertainty-based key cipher starts with some public information and some private information. The public information includes a vocabulary (alphabet) and keypad, and the private information can include an authentication code. The keypad is an abstraction that represents, for example, a set of “buttons.” These buttons will be used to translate a working key into a text that could be used to evaluate coincidences in a generated working key. Each keypad button can have more than one possible value. The number of options inside the button is the so called “uncertainty level.
    Type: Grant
    Filed: September 24, 2007
    Date of Patent: October 23, 2012
    Assignee: Avaya Inc.
    Inventor: Luciano Godoy Fagundes
  • Patent number: 8290151
    Abstract: A device for determining an inverse of an initial value related to a modulus, comprising a unit configured to process an iterative algorithm in a plurality of iterations, wherein an iteration includes two modular reductions and has, as an iteration loop result, values obtained by an iteration loop of an extended Euclidean algorithm.
    Type: Grant
    Filed: October 12, 2007
    Date of Patent: October 16, 2012
    Assignee: Infineon Technologies AG
    Inventor: Wieland Fischer
  • Patent number: 8284933
    Abstract: According to one embodiment, encrypting passwords includes performing the following for each input password of a plurality of input passwords to yield encrypted passwords, where at least two input passwords have different lengths and the encrypted passwords have the same length. An input password and a random number are received at logic configured to perform a key derivation operation comprising a pseudorandom function. An encryption key is derived from the input password and the random number according to the key derivation operation. The encryption key and a user identifier are received at logic configured to perform a cipher-based message authentication code (CMAC) function. An encrypted password is generated from the encryption key and the user identifier according to the CMAC function.
    Type: Grant
    Filed: March 19, 2009
    Date of Patent: October 9, 2012
    Assignee: CA, Inc.
    Inventors: Terry W. Chaisson, Adam S. Hendrix, Frederic A. H. Duminy
  • Patent number: 8284939
    Abstract: A method for secure cryptographic communication comprises transmitting information that identifies a group key from a first device to a second device. The method further comprises, in the first device, using the group key to encrypt an input vector, transmitting the encrypted input vector, encrypting privacy-sensitive information using a device key, an encryption algorithm, and the input vector, and transmitting the encrypted privacy-sensitive information to the second device.
    Type: Grant
    Filed: October 1, 2008
    Date of Patent: October 9, 2012
    Assignee: Neology, Inc.
    Inventors: Thomas Tahan, Jun Liu
  • Patent number: 8285994
    Abstract: Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed.
    Type: Grant
    Filed: November 14, 2011
    Date of Patent: October 9, 2012
    Assignee: Intel Corporation
    Inventors: Rahul C. Shah, Mark D. Yarvis
  • Patent number: 8280055
    Abstract: An optical network system including an OLT and ONUs is provided that can prevent the loss of a multicast signal. When receiving an encryption key generation request from the OLT, the ONU generates an encryption key, and transmits the generated encryption key to the OLT. When receiving a notice of timing from the OLT, the ONU updates the encryption key of a belonging group. When receiving a report message from a STB through the ONU, the OLT analyzes the report message, stores a group that the STB belongs to as well as the ONU in a second table, and transmits the encryption key generation request to the ONU. When receiving the encryption key from the ONU, the OLT further stores the encryption key in the second table, and transmits to the ONU a notice of the timing in which the encryption key is valid.
    Type: Grant
    Filed: December 10, 2009
    Date of Patent: October 2, 2012
    Assignee: Hitachi, Ltd.
    Inventors: Taiki Nema, Tohru Kazawa, Ryosuke Kurata
  • Patent number: 8270615
    Abstract: In a key-insulated cryptosystem according to the present invention, a plurality of external devices are associated with a number of updates of a terminal secret key which has already been updated, and a different piece of secret information is stored in each of the external devices. In addition, a key-updating method in the key-insulated cryptosystem according to the present invention includes steps of: selecting one of the external devices depending on the number of updates of the terminal secret key; and causing the selected external device to generate key-updating information used for updating the terminal secret key based on the number of updates and the stored secret information.
    Type: Grant
    Filed: March 19, 2010
    Date of Patent: September 18, 2012
    Assignee: NTT DoCoMo, Inc.
    Inventor: Yumiko Hanaoka
  • Patent number: 8270841
    Abstract: The present invention is directed to realize a stable and highly-efficient quantum communication without being influenced by the jitter of the heralding signal. In regard to the quantum encryption transmitting apparatus 200, the pulse-driven heralded single-photon source 201 generates a photon pair, outputs one photon of the photon pair, and outputs the other photon of the photon pair as a heralding signal. The timing adjuster 202 synchronizes the heralding signal with a clock signal for pulse driving the pulse-driven heralded single-photon source 201, and outputs as a trigger signal. The quantum communication modulating unit 203 implements the signal modulation to a quantum signal, in timing with the trigger signal, and transmits the quantum signal to the quantum encryption receiving apparatus 300 via the quantum communication path 101. The heralding signal transmitting unit 205 transmits the heralding signal to the quantum encryption receiving apparatus 300 via the heralding signal communication path 102.
    Type: Grant
    Filed: August 4, 2006
    Date of Patent: September 18, 2012
    Assignees: Mitsubishi Electric Corporation, National University Corporation Hokkaido University
    Inventors: Tsuyoshi Nishioka, Shigeki Takeuchi, Alexandre Soujaeff, Toshio Hasegawa, Junnichi Abe
  • Patent number: 8254891
    Abstract: A client application allows a user of a telecommunication device to retrieve contact data of a particular individual from a server to initiate contact with the particular individual without viewing content designated as private by the particular individual. The retrieved contact data includes encrypted content and non-encrypted content. The telecommunication device sends a directory request to the server requesting contact data from an electronic directory stored on the server. If the directory request is validated by the server, the telecommunication device receives the requested contact data from the server. The telecommunication device also receives a decryption key and a key expiration parameter from the server. The client application executing on the telecommunication device can use the decryption key within a time period defined by the key expiration parameter to decrypt encrypted contacted data on the telecommunication device to initiate contact with the particular individual.
    Type: Grant
    Filed: August 4, 2006
    Date of Patent: August 28, 2012
    Assignee: Microsoft Corporation
    Inventor: Abhishek Kumar Mishra
  • Patent number: 8250363
    Abstract: Secret random data is distributed to a plurality of devices to provision them with new one-time pad data for use in interacting with apparatus holding the same one-time pad data. This distribution is effected by provisioning a first device with a block of secret random data that is, or will become, available to the apparatus. Part of the secret random data is then distributed from the first device to one or more other devices in a hierarchical distribution pattern headed by the first device. Each device, other than those at the bottom of the distribution hierarchy, retains part of the secret random data it receives and passes on the remainder. Each device uses that part of the secret random data it has retained to provide the device with new one-time pad data. A method is also provided for tracking service usage based on the distributed one-time pad data.
    Type: Grant
    Filed: July 21, 2006
    Date of Patent: August 21, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Christopher Tofts, Timothy Paul Spiller, William John Munro, Martin Sadler, Keith Alexander Harrison
  • Patent number: 8249244
    Abstract: A system and method for recording and distributing calls are provided. A call may be associated with an information record. Parameters in the information record may be used to determine if the call is to be recorded. Parameters in the information record may be used to determine a method of providing a recording of the call. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 9, 2009
    Date of Patent: August 21, 2012
    Assignee: Nice Systems Ltd.
    Inventors: Jacob Naparstek, Leon Portman
  • Patent number: 8239928
    Abstract: Disclosed relates to an access control system and method based on hierarchical keys. The system comprises an access control server (ACS), a home gateway, and a plurality of sensor devices disposed on a home network. The ACS sets up user's access limits of authority and authorization verifier, and saves the related data of user's password and the user's access limits of authority. The gateway records the authority limits' level and the authority limits' key which are constructed based on a hierarchical key structure. When a user logs in the ACS to request access, an one-time communication key between the user and the home gateway is established by exchanging the ticket and the token that are issued by the ACS. This allows the user to access the information of the sensor devices.
    Type: Grant
    Filed: January 9, 2009
    Date of Patent: August 7, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Yi-Hsiung Huang, Lun-Chia Kuo, Wen-Guey Tzeng, Huan-Chung Lin, Chya-Hung Tsai
  • Patent number: 8233895
    Abstract: A source device is initially enabled to maintain data synchronization with a host server over a wireless communication network via a first wireless transceiver for user data of an application program associated with a user account. To enable a target device, the source device is operative to establish a programming session with the target device via a second wireless transceiver. During the programming session, the source device causes user account data (e.g. an encryption/decryption key for the data-synchronized communications) for the user account to be transmitted to the target device via the second wireless transceiver. The user data associated with the application program may be transferred from the source device to the target device via a removable memory card such as a secure digital (SD) card.
    Type: Grant
    Filed: November 23, 2010
    Date of Patent: July 31, 2012
    Assignee: Research In Motion Limited
    Inventor: Piotr Konrad Tysowski
  • Patent number: 8229857
    Abstract: A secure pre-recorded medium and a method for descrambling encrypted content thereon. When a player wants to access the content, a secure processor on the medium verifies that the player has not been revoked, preferably by comparing an identity of the player with identities in a revocation list, after which a mutual authentication is performed. The secure processor then verifies that the player has the rights to access the content and provides the player with the key necessary to descramble the content, whereafter the player descrambles the content.
    Type: Grant
    Filed: January 10, 2006
    Date of Patent: July 24, 2012
    Assignee: Thomson Licensing
    Inventors: Eric Diehl, Alain Durand
  • Publication number: 20120183145
    Abstract: Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.
    Type: Application
    Filed: March 30, 2012
    Publication date: July 19, 2012
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8219814
    Abstract: A user credential management system and method for managing user credentials are provided. The user credential management system comprises an authentication module for authenticating a user login to a mobile device, and a message transforming module for associating a user credential to a message sent from the mobile device to a server. The method comprising the steps of authenticating a user login to a mobile device, locating a user credential associated with the user login, and associating the user credential to a message between the mobile device and a server.
    Type: Grant
    Filed: June 30, 2005
    Date of Patent: July 10, 2012
    Assignee: Psion Teklogix Inc.
    Inventors: Ian Elbury, Rastislav Hodul