User-to-user Key Distributed Over Data Link (i.e., No Center) Patents (Class 380/283)
-
Patent number: 8473741Abstract: The present disclosure is directed to systems and methods including accessing a first private value, generating a first intermediate value based on the first private value, receiving a second intermediate value that is based on a second private value, generating a first comparison value based on the second intermediate value, receiving over the network a second comparison value that is based on the first intermediate value, comparing the first comparison value and the second comparison value to generate a result, and displaying the result, the result indicating that the first private is greater than the second private value when the first comparison value is less than the second comparison value, and the result indicating that the first private value is less than or equal to the second private value when the first comparison value is greater than the second comparison value.Type: GrantFiled: May 3, 2010Date of Patent: June 25, 2013Assignee: SAP AGInventor: Florian Kerschbaum
-
Patent number: 8462942Abstract: An approach is provided for providing secure packetized voice transmissions. A public/private key pair is generated at a call device (or endpoint). An encrypted voice stream is received from another call device, where the encrypted voice stream was encrypted using a public key of the public/private key pair. This encrypted voice stream when received at the call device is decrypted using a private key of the public/private key pair.Type: GrantFiled: August 17, 2009Date of Patent: June 11, 2013Assignee: Verizon Patent and Licensing Inc.Inventors: David E. Berggren, Steven E. Belczyk
-
Patent number: 8458806Abstract: Systems and methods for wirelessly exchanging an encryption key between a first device and a second device are disclosed herein.Type: GrantFiled: September 19, 2011Date of Patent: June 4, 2013Assignee: Research In Motion LimitedInventor: Vahid Moosavi
-
Patent number: 8452017Abstract: Methods and systems for secure channel initialization transaction security between a client network element and a server network element are disclosed.Type: GrantFiled: December 21, 2007Date of Patent: May 28, 2013Assignee: Research In Motion LimitedInventor: Alexander Sherkin
-
Patent number: 8447978Abstract: A wireless communication method includes receiving a first frame requesting to start a registration protocol in Wi-Fi protected setup (WPS) of wireless LAN security standards, transmitting, after receiving the first frame, a second frame containing security types and encryption keys for the respective security types, and transmitting a third frame, after transmitting the second frame, the third frame instructing to terminate WPS. The security types include at least one of Wi-Fi protected access (WPA), WPA2 and WEP.Type: GrantFiled: November 2, 2009Date of Patent: May 21, 2013Assignee: Kabushiki Kaisha ToshibaInventor: Youichirou Shiba
-
Publication number: 20130108046Abstract: Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device, biological data; utilizing the biological data, at the implantable medical device, to generate a public cryptographic key; and utilizing the public cryptographic key, at the implantable medical device, to generate a private cryptographic key.Type: ApplicationFiled: October 31, 2011Publication date: May 2, 2013Inventor: Dean P. ANDERSEN
-
Patent number: 8423794Abstract: A secure flash memory card or flash drive protects user content from unauthorized duplication. However, even the protected user content can be moved from one flash card or drive to another by its rightful owner or licensee. Additionally, secure firmware applications that may be added to the flash card over time in order to add additional functionality to the card may also be moved, although many of them are device specific and also designed to only operate on one particular piece of hardware.Type: GrantFiled: June 20, 2007Date of Patent: April 16, 2013Assignee: SanDisk Technologies Inc.Inventors: Michael Holtzman, Fabrice Jogand-Coulomb
-
Patent number: 8423510Abstract: This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user's actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant the remote server generates and downloads the same files that are downloaded on the local user computer devices.Type: GrantFiled: April 12, 2011Date of Patent: April 16, 2013Assignee: International Business Machines CorporationInventors: Dimitri Kanevsky, Alexander Zlatsin
-
Publication number: 20130089207Abstract: Digital rights management (DRM) can be implemented through use of an anchor point based digital rights management system. In one embodiment, a device may comprise an anchor point circuit including a memory and a processor. The processor may be configured to receive a title key from a digital content provider, the title key used to encrypt a digital property to produce an encrypted digital property. The processor may be further configured to generate a binding key, encrypt the title key with the binding key to produce a title pre-key, and store the binding key in the memory. In another embodiment a system may comprise an interface configured to communicate with a content provider, and an anchor point circuit configured to bind a digital property received from the content provider to the anchor point circuit such that the digital property can only be used in conjunction with the anchor point circuit.Type: ApplicationFiled: November 27, 2012Publication date: April 11, 2013Applicant: SEAGATE TECHNOLOGY LLCInventor: Paul Marvin Sweazy
-
Patent number: 8401196Abstract: A method and apparatus for performing Joint Randomness Not Shared by Others (JRNSO) is disclosed. In one embodiment, JRNSO is determined in Frequency Division Duplex (FDD) using a baseband signal loop back and private pilots. In another embodiment, JRNSO is determined in Time Division Duplex (TDD) using a baseband signal loop back and combinations of private pilots, private gain functions and Kalman filtering directional processing. In one example, the FDD and TDD JRSNO embodiments are performed in Single-Input-Single-Output (SISO) and Single-Input-Multiple-Output (SIMO) communications. In other examples, the FDD and TDD embodiments are performed in Multiple-Input-Multiple-Output (MIMO) and Multiple-Input-Single-Output (MISO) communications. JRNSO is determined by reducing MIMO and MISO communications to SISO or SIMO communications. JRNSO is also determined using determinants of MIMO channel products. Channel restrictions are removed by exploiting symmetric properties of matrix products.Type: GrantFiled: April 21, 2008Date of Patent: March 19, 2013Assignee: InterDigital Technology CorporationInventors: Steven J. Goldberg, Yogendra C. Shah, Alexander Reznik
-
Patent number: 8401588Abstract: A dual mode human interface device (HID) includes a wireless interface for wireless communication with a host computer; a wired interface for wired communication with the host computer; and a processor coupled with the wireless interface and the wired interface for transferring data between the HID and the host computer, wherein the processor initiates establishing wireless communication with the host computer, when the HID is connected to the host computer via the wired interface.Type: GrantFiled: October 27, 2005Date of Patent: March 19, 2013Assignee: Broadcom CorporationInventors: Muhammad Farooq Hameed, Brian Jason Tietz, Robert William Hulvey
-
Patent number: 8397083Abstract: A system and method efficiently deletes a file from secure storage, i.e., a cryptainer, served by a storage system. The cryptainer is configured to store a plurality of files, each of which stores an associated file key within a special metadata portion of the file. Notably, special metadata is created by a security appliance coupled to the storage system and attached to each file to thereby create two portions of the file: the special metadata portion and the main, “file data” portion. The security appliance then stores the file key within the specially-created metadata portion of the file. A cryptainer key is associated with the cryptainer. Each file key is used to encrypt the file data portion within its associated file and the cryptainer key is used to encrypt the part of the special metadata portion of each file. To delete the file from the cryptainer, the file key of the file is deleted and the special metadata portions of all other files stored in the cryptainer are re-keyed using a new cryptainer key.Type: GrantFiled: August 23, 2006Date of Patent: March 12, 2013Assignee: NetApp, Inc.Inventors: Robert Jan Sussland, Lawrence Wen-Hao Chang, Ananthan Subramanian
-
Patent number: 8392684Abstract: A network memory system for ensuring compliance is disclosed. The network memory system comprises a first appliance configured to encrypt first data, store the encrypted first data in a first memory device. The first appliance also determines whether the encrypted first data exists in a second appliance and transmits a store instruction comprising the encrypted first data based on the determination that the encrypted first data does not exist in the second appliance. The second appliance is further configured to receive a retrieve instruction comprising an index at which the encrypted first data is stored, process the retrieve instruction to obtain encrypted response data, and decrypt the encrypted response data.Type: GrantFiled: July 31, 2006Date of Patent: March 5, 2013Assignee: Silver Peak Systems, Inc.Inventor: David Anthony Hughes
-
Patent number: 8379866Abstract: A method of distributing an encoding/decoding program and a symmetric key in a security domain environment, and a device divider and data injector therefor are provided. The method includes selecting, at a highest-level security domain, an encoding/decoding program and a symmetric key to be distributed to a plurality of lower-level security domains; dividing the selected encoding/decoding program and the symmetric key into pieces as many as the number of lower-level security domains; and distributing the divided encoding/decoding program pieces and the symmetric key pieces to devices belonging to the lower-level security domains.Type: GrantFiled: September 8, 2009Date of Patent: February 19, 2013Assignee: Electronics and Telecommunications Research InstituteInventors: Jin Seok Yang, Young Seok Chung, Chang Su Hong, Jung Woo An, Jong Jin Won, Jong Cheol Moon
-
Patent number: 8369518Abstract: An object of the present invention is to provide an electronic data encryption and decryption system allowing a privileged user to decrypt all encrypted data without using a plurality of secret keys but only by using a single secret key that the privileged user himself has. An electronic data encryption and decryption system includes: a privileged user device, a user device, and an encrypted data generation device. The privileged user device has: a privileged user key generation means for generating a privileged user secret key x and a privileged user public key x·P (P is a generator); a first session key generation means for generating a session key K; and a first decryption means for decrypting the encrypted data by using the session key K generated by the first session key generation means.Type: GrantFiled: June 18, 2008Date of Patent: February 5, 2013Assignee: NEC CorporationInventor: Norikazu Kubotera
-
Patent number: 8369530Abstract: A network device adapted to communicate with other devices over a network, the device being arranged to, when the device is connected to a physical data carrier, automatically store a representation of a security key on the data carrier, and to provide at least one service over the network only to other devices making use of the security key.Type: GrantFiled: November 8, 2007Date of Patent: February 5, 2013Assignee: GS IP, Limited Liability CompanyInventor: Robert Macaulay
-
Patent number: 8369527Abstract: A multicast host for communicating information published about any one of a set of topics to one or more authorised subscribers to those topics, the set of topics being partitioned into one or more partition elements, each partition element having a partition element encryption key associated therewith, wherein each of the one or more partition elements is a disjoint proper subset of the set of topics, the host comprising: means for receiving information relating to a topic; means for determining a partition element for the topic; means for retrieving a partition element encryption key associated with the partition element; means for encrypting the information with the retrieved partition element encryption key; and means for communicating the information to the one or more authorised subscribers.Type: GrantFiled: June 22, 2005Date of Patent: February 5, 2013Assignee: International Business Machines CorporationInventors: Boaz Carmeli, John Justin Duigenan, Michael Damein Elder, Gidon Gershinsky
-
Patent number: 8345882Abstract: To safeguard data transmission, a first terminal communicates in a first network with the aid of at least one session key and a second terminal communicates in a second network with the aid of at least one session key. The first terminal is connected to the second terminal through a local interface. In the first terminal, at least one first session key is determined and at least one second session key is derived from the first session keys. At least one second session key is transmitted to the second terminal through the local interface by a safety protocol. The second terminal is authenticated to the second network by at least one second session key or by the key derived from the second session key(s) through an authentication protocol.Type: GrantFiled: November 10, 2004Date of Patent: January 1, 2013Assignee: Siemens AktiengesellschaftInventor: Günther Hom
-
Patent number: 8345861Abstract: A method and system for distributing a secret are described. In one embodiment, the secret is represented by a secret polynomial of degree d over GF(q) constructed with a prime or a power of a prime. The secret polynomial is then embedded into an extension polynomial of degree m that is greater than d. The extension polynomial is divided by n coprime divisor polynomials over GF(q), using arithmetic defined for polynomials over GF(q), to generate n shares of the secret. Each share includes one of the divisor polynomials and a corresponding remainder. These n shares are distributed among a plurality of cooperating entities for secret sharing.Type: GrantFiled: August 22, 2008Date of Patent: January 1, 2013Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8345877Abstract: In a transmitter, data is encrypted by use of a data key, the data key is encrypted based on a first modification key, and the first modification key is encrypted based on a second modification key such that the first and second modification keys are different keys. The encrypted data, the encrypted data key, and the encrypted first modification key are transmitted to a receiver. In the receiver, the encrypted first modification key, the encrypted data key, and the encrypted data are received from the transmitter. The encrypted first modification key is decrypted based on the second modification key, the encrypted data key is decrypted based on the decrypted first modification key, and the encrypted data is decrypted by use of the decrypted data key.Type: GrantFiled: November 20, 2009Date of Patent: January 1, 2013Assignee: Zenith Electronics LLCInventors: Raymond C. Hauge, Richard Lewis
-
Publication number: 20120328106Abstract: Methods, devices, systems and computer program products are provided to facilitate cryptographically secure retrieval of secret information that is embedded in a device. The embedded secret information can include a random number that is not custom-designed for any specific requestor of the secret information. Upon receiving a request for the embedded secret information, an encrypted secret is provided to the requestor that enables the recovery of the embedded secret information by only the requestor. Moreover, a need for maintenance of a database of the embedded secret information and the associated requestors is eliminated.Type: ApplicationFiled: June 24, 2011Publication date: December 27, 2012Applicant: BROADCOM CORPORATIONInventor: Andrew Dellow
-
Patent number: 8340296Abstract: Disclosed herein is a method and system for registering and verifying a smart card certificate for users moving between public key infrastructure domains, which allows a user moving between domains to have a smart card certified in a terminal located in an external domain other than a home domain. According to the present invention, when a user wants his/her own smart card to be certified in a terminal of an external domain, a certification authority of the external domain can certify the smart card using a certificate stored in the smart card and signed electronically by a certification authority of a home domain. Additionally, a new certificate issued by the certification authority of the external domain is stored in the certified smart card, so that a certificate of the moving user can be verified regardless of domains and a new certificate of a moved domain can be easily obtained.Type: GrantFiled: January 20, 2004Date of Patent: December 25, 2012Assignee: Samsung Electronics Co., Ltd.Inventors: Byung-rae Lee, Kyung-ah Chang
-
Patent number: 8335919Abstract: Secure bulk messaging mechanism in which, roughly described, a sender first encrypts a message once. The message can be decrypted with a message decryption key. These can be symmetric or asymmetric keys. For each recipient, the sender then encrypts the message decryption key with the recipient's public key. The sender then sends the encrypted message and the encrypted message decryption keys to a store-and-forward server. Subsequently, one or more recipients connect to the server and retrieve the encrypted message and the message encryption key that has been encrypted with the recipient's public key. Alternatively, the server can forward these items to each individual recipient. The recipient then decrypts the encrypted message decryption key with the recipient's private key, resulting in an un-encrypted message decryption key. The recipient then decrypts the message using the un-encrypted message decryption key.Type: GrantFiled: April 15, 2005Date of Patent: December 18, 2012Assignee: Axway Inc.Inventor: David Jevans
-
Publication number: 20120314865Abstract: NFC communication is utilized to provide methods, apparatus and systems for increasing the security of cryptographic keys and cryptographic processes. For the encryption and decryption of a message, public key cryptography requires the use of a pair of keys, i.e., the public key and the private key. Various embodiments of the present invention provide storage of information needed for one or more aspects of encrypting and/or decrypting messages, wherein that information is made available through an NFC communications interface. An NFC-enabled device is brought into physical proximity with a computational platform that is executing, or otherwise providing access to, an email client. Once the NFC-enabled device and the computational platform are within NFC communication range of each other, transfer of information needed to set up an encryption and/or decryption process takes place.Type: ApplicationFiled: June 21, 2011Publication date: December 13, 2012Applicant: Broadcom CorporationInventor: Robert KITCHEN
-
Patent number: 8327129Abstract: The present invention discloses a method, an apparatus, and a system for IKE negotiation. One method comprises: upon receiving a data packet, selecting one of multiple service cards according to a pre-configured policy and triggering the service card to send an IKE negotiation packet; and saving the mapping between the IKE negotiation packet and the service card. The other method comprises: upon receiving an IKE negotiation packet, selecting one of multiple service cards according to a pre-configured policy, triggering the service card to perform IKE negotiation, and saving the mapping between of the IKE negotiation packet and the service card. The solution enables a network node a node to distribute IKE negotiations to different service cards to perform IKE negotiation at the same time, improving IKE negotiation speed.Type: GrantFiled: June 23, 2008Date of Patent: December 4, 2012Assignee: Hangzhou H3C Technologies Co., Ltd.Inventors: Weichen Ren, Xudong Zou, Zhanming Wei, Xiangqing Chang
-
Patent number: 8321680Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.Type: GrantFiled: December 9, 2010Date of Patent: November 27, 2012Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Aram Perez, Gregory G. Rose, Laurence G. Lundblade, Matthew W. Hohfeld, Michael W. Paddon, Oliver Michaelis, Ricardo Jorge Lopez
-
Patent number: 8316234Abstract: A first communication device (“FCD”) is adapted to communicate with a second communication device. The FCD obtains a first key, encodes an attribute in the FCD with the first key to produce a first encoded value, and transmits the first encoded value to the second communication device. The FCD also receives a second encoded value from the second communication device. The second encoded value comprises an attribute stored in the second communication device that has been encoded with a second key. Further, the FCD encodes the second encoded value with the first key to produce a third encoded value, transmits the third encoded value to the second communication device, and receives a fourth encoded value from the second communication device. The fourth encoded value comprises the first encoded value after being encoded by the second key. The FCD determines whether the third encoded value matches the fourth encoded value.Type: GrantFiled: October 28, 2003Date of Patent: November 20, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Bernardo A. Huberman, Stephen P. Sorkin, Joshua R. Tyler
-
Patent number: 8316221Abstract: A method and a system for personalizing electronic elements, by replacing, in a non-volatile memory of each of the electronic elements a first secret key with a second secret key, by a secure authentication module automatically generating the second key after having restored the first one from an identifier of the element being personalized, including conditioning, on the authentication module side, the provision of the second key to a current element to the reception of a message confirming the key replacement of at least one preceding element.Type: GrantFiled: July 22, 2005Date of Patent: November 20, 2012Assignee: Proton World International N.V.Inventors: Joan Daemen, Thierry Huque, Paul Fontaine
-
Patent number: 8315393Abstract: A secure communication system wherein message decryption may be performed while off-line, or optionally while on-line. A sender encrypts a message based on the message key and sends it to the recipient. An envelope containing a message key is created by encrypting the message key based on a verifier, where the verifier is based on a secret of the recipient. The recipient is provided the envelope, along with the message or separately, from the sender or from another party, contemporaneous with receipt of the message or otherwise. The recipient can then open the envelope while off-line, based on their secret, and retrieve the message key from the envelope to decrypt the message. In the event the recipient cannot open the envelope, optional on-line access permits obtaining assistance that may include obtaining an alternate envelope that the recipient can open.Type: GrantFiled: July 20, 2010Date of Patent: November 20, 2012Assignee: Proofpoint, IncInventors: Jahanshah Moreh, Logan O'Sullivan Bruns
-
Patent number: 8316461Abstract: Provided is a method for delivering all or part of a rights object (RO) of a user associated with the content to other users. The method includes creating a rights object to be transmitted to a second user within a limit of the rights object held by the first user, and forwarding the created rights object to the second user. The method allows each user to share its own RO with other users within the limit of the RO without server authentication.Type: GrantFiled: October 14, 2009Date of Patent: November 20, 2012Assignee: Samsung Electronics Co., Ltd.Inventors: Kyung-ah Chang, Byung-rae Lee
-
Patent number: 8311214Abstract: Communication and validation of information transfer from a transmitter to a receiver is achieved by generating a cipher (400) from a message m (410) using parameters of an elliptic curve, a generator point P (406) on the elliptic curve and a public key Q (416) of the receiver. The cipher includes a first element that is the product kP of a random number k (404) with the generator point P and a second element that is the product of m and the x-coordinate of the product kQ. The message m is generated from two mathematically independent representations of the information and, optionally, a random number. The cipher is communicated to the receiver and decoded to recover a message m? (502). A validation token (500) is generated by the receiver and passed to the transmitter, which validates communication of the information to the receiver if the product mkQ is equal to the validation token.Type: GrantFiled: April 24, 2006Date of Patent: November 13, 2012Assignee: Motorola Mobility LLCInventors: Ronald F. Buskey, Barbara B. Frosik, Douglas A. Kuhlman
-
Patent number: 8307211Abstract: A method of verifying a pair of correspondents in electronic transaction, the correspondents each including first and second signature schemes and wherein the first signature scheme is computationally more difficult in signing than verifying and the second signature scheme is computationally more difficult in verifying than signing. The method comprises the step of the first correspondent signing information according to the first signature scheme and transmitting the first signature to the second correspondent, the second correspondent verifying the first signature received from the first correspondent, wherein the verification is performed according to the first signature scheme.Type: GrantFiled: September 28, 2010Date of Patent: November 6, 2012Assignee: Certicom Corp.Inventor: Scott Alexander Vanstone
-
Publication number: 20120272056Abstract: To provide key management layered on a quasi-out-of-band authentication system, a security server receives a request for activation of a user interface window for a particular user from a network device via a communication channel. It then transmits an activation PIN to an out of band authentication system for forwarding to the user's telephone via a voice or text message. It next receives the previously transmitted PIN from the network device via the communication channel, and authenticates the user based on the received PIN. After authenticating the user, it establishes a secure, independent, encrypted communication channel between the user interface window and the security server on top of the original communication channel. It then generates and transmits to the user interface window and/or receives from the user interface window via the secure communication channel, key material and certificate material for public key and/or symmetric key cryptography based operations.Type: ApplicationFiled: April 19, 2011Publication date: October 25, 2012Applicant: HAWK AND SEAL, INC.Inventor: Ravi Ganesan
-
Patent number: 8295487Abstract: A method and apparatus for establishing a cryptographic relationship between a first node and a second node in a communications network. The first node receives at least part of a cryptographic attribute of the second node, uses the received at least part of the cryptographic attribute to generate an identifier for the first node. The cryptographic attribute may a public key belonging to the second node, and the identifier may be a Cryptographically Generated IP address. The cryptographic relationship allows the second node to establish with a third node that it is entitled to act on behalf of the first node.Type: GrantFiled: November 21, 2008Date of Patent: October 23, 2012Assignee: Telefonaktiebolaget L M Ericsson (publ)Inventors: Wassim Haddad, Mats Naslund
-
Patent number: 8295480Abstract: A recursive based approach to key generation produces keys for encrypted communication. Simple mathematical operations are utilized with the inherent uncertainty of an interactive process between two endpoints to establish a common secret key. The uncertainty-based key cipher starts with some public information and some private information. The public information includes a vocabulary (alphabet) and keypad, and the private information can include an authentication code. The keypad is an abstraction that represents, for example, a set of “buttons.” These buttons will be used to translate a working key into a text that could be used to evaluate coincidences in a generated working key. Each keypad button can have more than one possible value. The number of options inside the button is the so called “uncertainty level.Type: GrantFiled: September 24, 2007Date of Patent: October 23, 2012Assignee: Avaya Inc.Inventor: Luciano Godoy Fagundes
-
Patent number: 8290151Abstract: A device for determining an inverse of an initial value related to a modulus, comprising a unit configured to process an iterative algorithm in a plurality of iterations, wherein an iteration includes two modular reductions and has, as an iteration loop result, values obtained by an iteration loop of an extended Euclidean algorithm.Type: GrantFiled: October 12, 2007Date of Patent: October 16, 2012Assignee: Infineon Technologies AGInventor: Wieland Fischer
-
Patent number: 8284933Abstract: According to one embodiment, encrypting passwords includes performing the following for each input password of a plurality of input passwords to yield encrypted passwords, where at least two input passwords have different lengths and the encrypted passwords have the same length. An input password and a random number are received at logic configured to perform a key derivation operation comprising a pseudorandom function. An encryption key is derived from the input password and the random number according to the key derivation operation. The encryption key and a user identifier are received at logic configured to perform a cipher-based message authentication code (CMAC) function. An encrypted password is generated from the encryption key and the user identifier according to the CMAC function.Type: GrantFiled: March 19, 2009Date of Patent: October 9, 2012Assignee: CA, Inc.Inventors: Terry W. Chaisson, Adam S. Hendrix, Frederic A. H. Duminy
-
Patent number: 8284939Abstract: A method for secure cryptographic communication comprises transmitting information that identifies a group key from a first device to a second device. The method further comprises, in the first device, using the group key to encrypt an input vector, transmitting the encrypted input vector, encrypting privacy-sensitive information using a device key, an encryption algorithm, and the input vector, and transmitting the encrypted privacy-sensitive information to the second device.Type: GrantFiled: October 1, 2008Date of Patent: October 9, 2012Assignee: Neology, Inc.Inventors: Thomas Tahan, Jun Liu
-
Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
Patent number: 8285994Abstract: Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed.Type: GrantFiled: November 14, 2011Date of Patent: October 9, 2012Assignee: Intel CorporationInventors: Rahul C. Shah, Mark D. Yarvis -
Patent number: 8280055Abstract: An optical network system including an OLT and ONUs is provided that can prevent the loss of a multicast signal. When receiving an encryption key generation request from the OLT, the ONU generates an encryption key, and transmits the generated encryption key to the OLT. When receiving a notice of timing from the OLT, the ONU updates the encryption key of a belonging group. When receiving a report message from a STB through the ONU, the OLT analyzes the report message, stores a group that the STB belongs to as well as the ONU in a second table, and transmits the encryption key generation request to the ONU. When receiving the encryption key from the ONU, the OLT further stores the encryption key in the second table, and transmits to the ONU a notice of the timing in which the encryption key is valid.Type: GrantFiled: December 10, 2009Date of Patent: October 2, 2012Assignee: Hitachi, Ltd.Inventors: Taiki Nema, Tohru Kazawa, Ryosuke Kurata
-
Patent number: 8270615Abstract: In a key-insulated cryptosystem according to the present invention, a plurality of external devices are associated with a number of updates of a terminal secret key which has already been updated, and a different piece of secret information is stored in each of the external devices. In addition, a key-updating method in the key-insulated cryptosystem according to the present invention includes steps of: selecting one of the external devices depending on the number of updates of the terminal secret key; and causing the selected external device to generate key-updating information used for updating the terminal secret key based on the number of updates and the stored secret information.Type: GrantFiled: March 19, 2010Date of Patent: September 18, 2012Assignee: NTT DoCoMo, Inc.Inventor: Yumiko Hanaoka
-
Patent number: 8270841Abstract: The present invention is directed to realize a stable and highly-efficient quantum communication without being influenced by the jitter of the heralding signal. In regard to the quantum encryption transmitting apparatus 200, the pulse-driven heralded single-photon source 201 generates a photon pair, outputs one photon of the photon pair, and outputs the other photon of the photon pair as a heralding signal. The timing adjuster 202 synchronizes the heralding signal with a clock signal for pulse driving the pulse-driven heralded single-photon source 201, and outputs as a trigger signal. The quantum communication modulating unit 203 implements the signal modulation to a quantum signal, in timing with the trigger signal, and transmits the quantum signal to the quantum encryption receiving apparatus 300 via the quantum communication path 101. The heralding signal transmitting unit 205 transmits the heralding signal to the quantum encryption receiving apparatus 300 via the heralding signal communication path 102.Type: GrantFiled: August 4, 2006Date of Patent: September 18, 2012Assignees: Mitsubishi Electric Corporation, National University Corporation Hokkaido UniversityInventors: Tsuyoshi Nishioka, Shigeki Takeuchi, Alexandre Soujaeff, Toshio Hasegawa, Junnichi Abe
-
Patent number: 8254891Abstract: A client application allows a user of a telecommunication device to retrieve contact data of a particular individual from a server to initiate contact with the particular individual without viewing content designated as private by the particular individual. The retrieved contact data includes encrypted content and non-encrypted content. The telecommunication device sends a directory request to the server requesting contact data from an electronic directory stored on the server. If the directory request is validated by the server, the telecommunication device receives the requested contact data from the server. The telecommunication device also receives a decryption key and a key expiration parameter from the server. The client application executing on the telecommunication device can use the decryption key within a time period defined by the key expiration parameter to decrypt encrypted contacted data on the telecommunication device to initiate contact with the particular individual.Type: GrantFiled: August 4, 2006Date of Patent: August 28, 2012Assignee: Microsoft CorporationInventor: Abhishek Kumar Mishra
-
Patent number: 8250363Abstract: Secret random data is distributed to a plurality of devices to provision them with new one-time pad data for use in interacting with apparatus holding the same one-time pad data. This distribution is effected by provisioning a first device with a block of secret random data that is, or will become, available to the apparatus. Part of the secret random data is then distributed from the first device to one or more other devices in a hierarchical distribution pattern headed by the first device. Each device, other than those at the bottom of the distribution hierarchy, retains part of the secret random data it receives and passes on the remainder. Each device uses that part of the secret random data it has retained to provide the device with new one-time pad data. A method is also provided for tracking service usage based on the distributed one-time pad data.Type: GrantFiled: July 21, 2006Date of Patent: August 21, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Christopher Tofts, Timothy Paul Spiller, William John Munro, Martin Sadler, Keith Alexander Harrison
-
Patent number: 8249244Abstract: A system and method for recording and distributing calls are provided. A call may be associated with an information record. Parameters in the information record may be used to determine if the call is to be recorded. Parameters in the information record may be used to determine a method of providing a recording of the call. Other embodiments are described and claimed.Type: GrantFiled: March 9, 2009Date of Patent: August 21, 2012Assignee: Nice Systems Ltd.Inventors: Jacob Naparstek, Leon Portman
-
Patent number: 8239928Abstract: Disclosed relates to an access control system and method based on hierarchical keys. The system comprises an access control server (ACS), a home gateway, and a plurality of sensor devices disposed on a home network. The ACS sets up user's access limits of authority and authorization verifier, and saves the related data of user's password and the user's access limits of authority. The gateway records the authority limits' level and the authority limits' key which are constructed based on a hierarchical key structure. When a user logs in the ACS to request access, an one-time communication key between the user and the home gateway is established by exchanging the ticket and the token that are issued by the ACS. This allows the user to access the information of the sensor devices.Type: GrantFiled: January 9, 2009Date of Patent: August 7, 2012Assignee: Industrial Technology Research InstituteInventors: Yi-Hsiung Huang, Lun-Chia Kuo, Wen-Guey Tzeng, Huan-Chung Lin, Chya-Hung Tsai
-
Patent number: 8233895Abstract: A source device is initially enabled to maintain data synchronization with a host server over a wireless communication network via a first wireless transceiver for user data of an application program associated with a user account. To enable a target device, the source device is operative to establish a programming session with the target device via a second wireless transceiver. During the programming session, the source device causes user account data (e.g. an encryption/decryption key for the data-synchronized communications) for the user account to be transmitted to the target device via the second wireless transceiver. The user data associated with the application program may be transferred from the source device to the target device via a removable memory card such as a secure digital (SD) card.Type: GrantFiled: November 23, 2010Date of Patent: July 31, 2012Assignee: Research In Motion LimitedInventor: Piotr Konrad Tysowski
-
Patent number: 8229857Abstract: A secure pre-recorded medium and a method for descrambling encrypted content thereon. When a player wants to access the content, a secure processor on the medium verifies that the player has not been revoked, preferably by comparing an identity of the player with identities in a revocation list, after which a mutual authentication is performed. The secure processor then verifies that the player has the rights to access the content and provides the player with the key necessary to descramble the content, whereafter the player descrambles the content.Type: GrantFiled: January 10, 2006Date of Patent: July 24, 2012Assignee: Thomson LicensingInventors: Eric Diehl, Alain Durand
-
Publication number: 20120183145Abstract: Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.Type: ApplicationFiled: March 30, 2012Publication date: July 19, 2012Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8219814Abstract: A user credential management system and method for managing user credentials are provided. The user credential management system comprises an authentication module for authenticating a user login to a mobile device, and a message transforming module for associating a user credential to a message sent from the mobile device to a server. The method comprising the steps of authenticating a user login to a mobile device, locating a user credential associated with the user login, and associating the user credential to a message between the mobile device and a server.Type: GrantFiled: June 30, 2005Date of Patent: July 10, 2012Assignee: Psion Teklogix Inc.Inventors: Ian Elbury, Rastislav Hodul