User-to-user Key Distributed Over Data Link (i.e., No Center) Patents (Class 380/283)
  • Patent number: 8218763
    Abstract: A method for electronically storing and retrieving at a later date a true copy of a document stored on a remote storage device comprises: sending a document in electronic format from a document owner's computing device to a store entity for storing the document; generating a digest of the document while the document is at the store entity by applying a hash function to the document; signing the digest electronically with a key while said document is at the store entity; generating a receipt that includes the digest and the key; sending the receipt to the document owner; and verifying, at the document owner's computing device, that the received receipt corresponds to the document sent from the owner's computing device.
    Type: Grant
    Filed: April 22, 2009
    Date of Patent: July 10, 2012
    Assignee: International Business Machines Corporation
    Inventor: John G. Rooney
  • Patent number: 8213608
    Abstract: Techniques for generating a portion of a split private key are provided. A first symmetric key and a second symmetric key different than the first symmetric key are generated at a first location. The generated second symmetric key and a first one of multiple factors for generating the private key portion encrypted with the generated first symmetric key are transmitted. Then, at a second network location, the symmetric keys are again generated. The encrypted first factor is received at the second network location subsequent to a user authentication based upon the second symmetric key generated at the second network location. The received encrypted first factor is then decrypted with the first symmetric key generated at the second network location, the decrypted first factor usable to generate the portion of the split private key of the asymmetric key pair.
    Type: Grant
    Filed: September 8, 2008
    Date of Patent: July 3, 2012
    Assignee: VMware, Inc.
    Inventors: Ravinderpal Singh Sandhu, Brett Jason Schoppert, Ravi Ganesan, Mihir Bellare, Colin Joseph deSa
  • Patent number: 8213967
    Abstract: A method and system for preventing replay-type attacks on a vehicle communications system that sends short message service (SMS) messages between a call center and a fleet of vehicles. The method uses separate sequence counters maintained at the call center and at each of the vehicles in the fleet to help prevent or at least minimize the effects of unauthorized third party interference; such as replay-type attacks. Each wireless message is embedded with a sequence counter that is provided by the sender and is compared by the recipient with a separate sequence counter for purposes of validation. Some optional features that can be used in conjunction with the sequence counters include a tolerance window feature, a consecutive message feature, and a proximity feature, to name but a few.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: July 3, 2012
    Assignee: GM Global Technology Operations LLC
    Inventors: James M. Kortge, Ansaf I. Alrabady
  • Patent number: 8208638
    Abstract: A set of equipment for secure direct information transfer over the Internet contains information transmitting terminal devices for collaborating with an information forwarding network, taking part in the information traffic. The individual information transmitting terminal devices are equipped with a sender partial unit, a receiver partial unit and a storage partial unit comprising an ID-register containing a device identification signal, a C-register for storing a coding key and a D-register for storing a decoding key. The C-register containing the coding key is connected to the sender partial unit, and a coding key and a collaborating decoding key are allocated to each individual information transmitting terminal device.
    Type: Grant
    Filed: November 2, 2004
    Date of Patent: June 26, 2012
    Inventors: Miklós Jobbágy, Gábor Kuti, János Zelenák
  • Publication number: 20120155641
    Abstract: A processor on a delegator receives an input upon which an expensive function is to be evaluated. The delegator incorporates the input into a request to perform a task that is different from evaluating the function. When the task is performed, it provides a secondary result that is observable by the delegator. The secondary result is different from an answer to the expensive function and can be verified by the delegator with less computational expense than evaluation of the expensive function. The task can be performed by the server only after the server has verifiably evaluated the function based on the input. Request data, that is indicative of the request to perform a task with the input incorporated therein is transmitted to the server for performance of the task. The delegator then receives a returned result from the server indicative of the server performing the task.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Vinod Vaikuntanathan, Panagiotis Voulgaris
  • Patent number: 8204230
    Abstract: A communication device including a communication connection establishing circuit configured to establish an ad hoc network communication connection between the communication device, a second communication device and a third communication device, a generating circuit configured to generate encryption parameters to be used by the second communication device and the third communication device for encrypting and decrypting data transmitted between the second communication device and the third communication device via the communication connection when the first communication device has left the communication connection, a signaling circuit configured to signal the encryption parameters to the second communication device and the third communication device, and a disconnection circuit configured to remove the communication device from the communication connection.
    Type: Grant
    Filed: May 8, 2007
    Date of Patent: June 19, 2012
    Assignee: Infineon Technologies AG
    Inventors: Andreas Schmidt, Norbert Schwagmann, Achim Luft, Michael Benkert
  • Patent number: 8204220
    Abstract: A method of sharing keys among a plurality of conditional access (CA) vendors having differing CA systems used at a distribution headend involves receiving a CA Value contribution from each of the plurality of CA vendors at the headend; hashing the CA Values from each of the plurality of CA vendors together using a hashing function to produce an output control word; and at an encrypter at the headend, using the output control word as a content key, wherein the content key is used as an encryption key to encrypt content provided to a plurality of receivers that decrypt the content using any of the conditional access systems. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
    Type: Grant
    Filed: September 18, 2008
    Date of Patent: June 19, 2012
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventor: Brant L. Candelore
  • Patent number: 8201233
    Abstract: Methods and apparatus are provided to allow Internet Key Exchange (IKE) phase 1 keying materials to be periodically refreshed in a secure manner without requiring user interaction. A client and server perform authentication and key exchange during set up of a secure connection. A token is passed to the client by the server during or after the initial user authentication phase. The token is stored both at the client and at the server. Instead of requiring user credentials, the token can be used to securely prove the identity of the client.
    Type: Grant
    Filed: February 6, 2006
    Date of Patent: June 12, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Stephane Beaulieu, David Silverman, Scott Fanning
  • Patent number: 8196182
    Abstract: An apparatus and method for managing the distribution and expansion of public keys held by a group or array of systems in white lists. The addition of a new system to the array entails a manual input to authorize the introduction of the new system to one trusted system in the array. After the introduction the new system is trusted by the one member and the white list of the one member is loaded into the white list of the new system. The new system then requests joining each of the other systems in the array. For each system in the array asked by the new system, the systems in the array ask if any other systems in the array already trust the new member. In response, a system of the array that trusts the new system responds by sending its white list (containing the public key of the new system) to the requesting system. Eventually the public key of the new system is in the white lists of all the systems in the array.
    Type: Grant
    Filed: August 21, 2008
    Date of Patent: June 5, 2012
    Assignee: NetApp, Inc.
    Inventors: Robert J. Sussland, Joshua Oran Silberman, Ananthan Subramanian, Lawrence Wen-Hao Chang
  • Patent number: 8189789
    Abstract: An inventive system and method for intrusion-tolerant group management for a network is presented. The method comprises a client broadcasting a message request to controllers and validating the rekey messages received from the controllers, and controllers validating the client's broadcast message request and broadcasting proposals, collecting proposals, constructing threshold-signed proofs, updating the view umber, performing the client's message request, generating the rekey based on the valid proposals and transmitting the rekey to the client. Simultaneously, controllers send reconciliation messages to all controllers, based on which the membership state is updated. The client updates a shared key when a predetermined number of valid rekey messages are received. The controllers can communicate via a byzantine fault-tolerant agreement. The client can use its public key to decrypt the rekey and perform validation. The client's message request can be a join or a leave.
    Type: Grant
    Filed: November 3, 2009
    Date of Patent: May 29, 2012
    Assignee: Telcordia Technologies, Inc.
    Inventors: Brian A. Coan, Jonathan Kirsch
  • Patent number: 8184989
    Abstract: A communication system and a timing control method are proposed that optimize timing in a sender and thereby enable information to be stably transmitted at the right timing. Under instructions from a timing controller in a receiver, the timing of driving a phase modulator in a sender is shifted by one step after another, and the then amount of clock shift and result of interference are monitored at the receiver and stored in a memory. The optimum timing is determined based on the stored data. Thus, a clock for driving the phase modulator in the sender can be set at the right timing. This is equivalent to compensating for group velocity dispersion due to wavelength dispersion that occurs when an optical signal channel and a clock signal channel are transmitted by wavelength division multiplexing transmission.
    Type: Grant
    Filed: June 21, 2006
    Date of Patent: May 22, 2012
    Assignee: NEC Corporation
    Inventors: Wakako Maeda, Akio Tajima, Akihiro Tanaka, Seigo Takahashi
  • Patent number: 8180060
    Abstract: In the telemedical system securely sharing encryption keys for enabling secure exchange of the encrypted biological data between the measurement terminal and the server to prevent the data from being stolen by the malicious third party, a service key is transferred to the second adapter attached to a measurement terminal from the server via the first adapter attached to the management apparatus. First, the first adapter attached to the management apparatus receives the service key from the server. Next, the first adapter is temporarily detached from the management apparatus and is attached to the measurement terminal to store the symmetric key. The first adapter is detached from the measurement terminal, and is attached to the management apparatus again. The service key received in the first adapter is encrypted using the symmetric key, and the encrypted key is transmitted to the second adapter attached to the measurement terminal.
    Type: Grant
    Filed: August 20, 2008
    Date of Patent: May 15, 2012
    Assignee: Panasonic Corporation
    Inventors: Kazuhiro Aizu, Yosuke Tajika, Daisuke Kobayashi, Hiromichi Nishiyama, Masao Nonaka, Natsume Matsuzaki, Kaoru Yokota, Yuichi Futa
  • Patent number: 8175277
    Abstract: Intercepting a secure communication session includes distributing a key from a key distribution point to establish a secure communication session between a first endpoint and a second endpoint. A secure channel is established between the key distribution point and an intercepting point. The intercepting endpoint may be determined to be authorized to intercept the secure communication session. The key is provided to the intercepting endpoint only if the intercepting endpoint is authorized to intercept the secure communication session, where the key provides the intercepting endpoint with access to intercept the secure communication session.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: May 8, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Robert T. Bell, Subbiah Kandasamy, Daniel G. Wing
  • Patent number: 8166301
    Abstract: A method is disclosed for enabling stateless server-based pre-shared secrets. Based on a local key that is not known to a client, a server encrypts the client's state information. The client's state information may include, for example, the client's authentication credentials, the client's authorization characteristics, and a shared secret key that the client uses to derive session keys. By any of a variety of mechanisms, the encrypted client state information is provided to the client. The server may free memory that stored the client's state information. When the server needs the client's state information, the client sends, to the server, the encrypted state information that the client stored. The server decrypts the client state information using the local key. Because each client stores that client's own state information in encrypted form, the server does not need to store any client's state information permanently.
    Type: Grant
    Filed: August 22, 2007
    Date of Patent: April 24, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Nancy Cam-Winget, Hao Zhou, Padmanabha C. Jakkahalli, Joseph Salowey, David A. McGrew
  • Patent number: 8160244
    Abstract: Stateless hardware security modules facilitate securing data transfers between devices in a data communication system. The stateless hardware security module may communicate with other devices via a secure communication channel to securely transfer information between the client device and another device. As a result, sensitive information such as cryptographic keys and data may be securely routed between the client device and another device. The stateless hardware security module may support a limited set of key management operations to facilitate routing of information between the client device and another device. However, the stateless hardware security module does not need to maintain state information for the keys it maintains and/or uses. As a result, the stateless hardware security module may be advantageously integrated into a variety of client devices.
    Type: Grant
    Filed: June 21, 2005
    Date of Patent: April 17, 2012
    Assignee: Broadcom Corporation
    Inventor: Mark Buer
  • Patent number: 8160255
    Abstract: Various embodiments of the disclosed subject matter provide methods and systems for improved efficiency and security in secure gateway-to-secure gateway network communication. Embodiments provide systems and methods for generating a sender secure gateway private identity, obtaining a receiver secure gateway public identity, generating an encryption key using the sender secure gateway private identity and the receiver secure gateway public identity, encrypting a data packet using the encryption key, and sending the encrypted data packet to a receiver secure gateway. Embodiments also provide systems and methods for generating a receiver secure gateway private identity, obtaining a sender secure gateway public identity, generating a decryption key using the receiver secure gateway private identity and the sender secure gateway public identity, receiving an encrypted data packet from a sender secure gateway, and decrypting the data packet using the decryption key.
    Type: Grant
    Filed: April 24, 2006
    Date of Patent: April 17, 2012
    Assignee: Cisco Technology, Inc.
    Inventor: Scott Fluhrer
  • Patent number: 8156560
    Abstract: The present invention discloses an apparatus and method for defining and enforcing rules of transition between two security domains, e.g., a transport domain and a persistent security domain. In turn, a border guard, e.g., a security device, is provided between these two domains that enforce rules for transition between the two security domains. This novel approach of defining a transport domain and a persistent security domain simplifies the classification of the digital content and its movement through the system. Namely, the border guard once established between the two systems can enforce DRM rules associated with how contents are moved between the two domains.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: April 10, 2012
    Assignee: General Instrument Corporation
    Inventors: John I. Okimoto, Bridget D. Kimball, Annie O. Chen, Michael T. Habrat, Douglas M. Petty, Eric Sprunk, Lawrence W. Tang
  • Patent number: 8145900
    Abstract: This disclosure relates to pairing of a different cryptographic key with each pointer in a data structure to form a crypto-pointer. The cryptographic key is used to encrypt the contents of all data stored at the physical location on the storage device indicated by the pointer. Preferably the only data accessible in an unencrypted form is contained in cells that are reachable from root-set crypto-pointers. Once the crypto-pointer associated with a particular memory cell is deleted, normally by overwriting or explicitly zeroing the crypto-pointer, the contents of the memory cell become inaccessible because the data stored at that cell is in encrypted form (cipher text) and the crypto-pointer that included the cryptographic key for decrypting the cipher text has been deleted from the system.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: March 27, 2012
    Assignee: Galois, Inc.
    Inventors: John Launchbury, Thomas Nordin
  • Patent number: 8144877
    Abstract: A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key by the network side and the user equipment, and negotiating an activation time of the new keys. An apparatus for updating a key in an active state is also disclosed according to the present invention. With the present invention, the user equipment in an active state and the network side may actively initiate the key update procedure in different cases, thereby solving the problem concerning the key update for a session in an active state.
    Type: Grant
    Filed: September 9, 2011
    Date of Patent: March 27, 2012
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Yanmei Yang, Min Huang
  • Publication number: 20120070003
    Abstract: The invention includes a method for encrypting and transmitting a message M from a first location to a second location. Random numbers P and Q are initially selected, each of them being either a prime or a non-prime number. P and Q are both furnished to a sender and a recipient at the first and second locations, respectively. A client at the first location generates an encrypted message E, which is the remainder left when a modulus operator divides a first quantity, equal to M multiplied by P to the i power, where i is a selected number, by a second quantity equal to (PQ?1). A tuple comprising E and i is transmitted from the first location to the second location, and a second data processing system at the second location to determines the message M from E, i and Q.
    Type: Application
    Filed: September 21, 2010
    Publication date: March 22, 2012
    Applicant: International Business Machines Corporation
    Inventors: Subramaniyam Chandrasekaran, Arun C. Ramachandran, Lakshmanan Velusamy, Vinodh Kumar Venkatesan
  • Patent number: 8135954
    Abstract: A server, e.g., a client (105, 107, 109), receives a request for a digital signature to be applied to digital information, obtains a representation of the information, determines a designation of key pair(s) to be applied thereto; and transmits a request for the digital signature to a front end server (103a, 103b). The front end server determines one or more of whether the client is authentic and authorized, the user identifier is authentic, and the user identifier is permitted to make the request. If so, the front end server transmits a request to generate a digital signature to a back end server (101). The back end server determines one or more of whether the front end server is authentic and the designated key pair correspond to the requesting front end server. If so, the back end server generates the digital signature based on the information and the key pair(s).
    Type: Grant
    Filed: December 20, 2004
    Date of Patent: March 13, 2012
    Assignee: Motorola Mobility, Inc.
    Inventors: Joel D. Voss, Ronald F. Buskey, Joseph M. Hansen, David H. Hartley, Michael J. Terrington
  • Patent number: 8127150
    Abstract: In one embodiment, a method is provided that may include encrypting, based least in part upon at least one key, one or more respective portions of input data to generate one or more respective portions of output data to be stored in one or more locations in storage. The method of this embodiment also may include generating, based at least in part upon the one or more respective portions of the output data, check data to be stored in the storage, and/or selecting the one or more locations in the storage so as to permit the one or more respective portions of the output data to be distributed among two or more storage devices comprised in the storage. Many modifications, variations, and alternatives are possible without departing from this embodiment.
    Type: Grant
    Filed: May 28, 2009
    Date of Patent: February 28, 2012
    Assignee: Intel Corporation
    Inventors: Eshwari P. Komarla, Vincent J. Zimmer, Mallik Bulusu
  • Patent number: 8127135
    Abstract: A system comprises a first operating environment and a second operating environment. The first and second operating environments exchange information in encrypted form using a shared encryption key (K3). The first and second operating environments cooperate to change the encryption key K3 using another shared encryption key (K4). The encryption key K4 is changed upon the encryption key K3 being changed.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: February 28, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Wael M. Ibrahim, Lan Wang, Jennifer E. Rios, Valluddin Y. Ali, Manuel Novoa
  • Patent number: 8121296
    Abstract: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key and provided periodically to a user. Broadcasts are then encrypted using the short-time key, wherein the user decrypts the broadcast message using the short-time key.
    Type: Grant
    Filed: August 20, 2001
    Date of Patent: February 21, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Philip Hawkes, Gregory G. Rose, Raymond T. Hsu, Ramin Rezaiifar
  • Publication number: 20120027213
    Abstract: A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed.
    Type: Application
    Filed: October 5, 2011
    Publication date: February 2, 2012
    Inventor: Vincent R. Scarlata
  • Publication number: 20120027202
    Abstract: A method and system to increase the security of messages transmitted over an otherwise unsecured network. A secure channel is established in a normal manner over the network. A demodularization module on the sender sends a demodularization method to the intended receiver over the secure channel. The sender encodes a message definition and message data separately consistent with the demodularization method. The message definition and message key is sent over the secure channel as one transmission and the message data with the message key is sent as separate transmissions over the secure channel. Other embodiments are also described and claimed.
    Type: Application
    Filed: July 27, 2010
    Publication date: February 2, 2012
    Applicant: SAP AG
    Inventor: Robert Heidasch
  • Patent number: 8108674
    Abstract: A transmitting/receiving system includes a transmitting apparatus that transmits, to another apparatus, first encrypted data obtained by encrypting stream data including consecutive unit data items in accordance with a first encryption technique prescribing that, when the stream data is encrypted for each item, keys used for encrypting the items are updated, and a receiving apparatus that receives and decrypts the first data from the transmitting apparatus in accordance with a first decryption technique. The transmitting apparatus includes an encryptor that outputs second encrypted data obtained by generating data including a predetermined number of keys, and encrypting the data in accordance with a second encryption technique, a transmitter that transmits the second data from the encryptor to the receiving apparatus.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: January 31, 2012
    Assignee: Sony Corporation
    Inventor: Takayuki Takeda
  • Patent number: 8108676
    Abstract: According to one embodiment, a method is disclosed. The method includes generating a link key at a secure component within a first personal area network device and injecting the link key into a protocol stack component database within the first device. The link key may further be transmitted to a second device. Other embodiments are described and claimed.
    Type: Grant
    Filed: July 19, 2010
    Date of Patent: January 31, 2012
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Uma M. Gadamsetty
  • Patent number: 8103593
    Abstract: A system for providing digital rights management (DRM) license is provided. The system includes a sink system requesting a license for content, a source system generating and providing a first rights token including binding information related to the license, in accordance with the request, and a rights mediator generating a second rights token that is usable in the sink system on the basis of the first rights token and transmitting the generated second rights token to the sink system. The sink system provides the license for the content on the basis of the second rights token. The first rights token includes binding information of principals that indicates use subjects related to the license, and binding information of principals that indicates use objects related to the license.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: January 24, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Hyoung-shick Kim
  • Patent number: 8099592
    Abstract: A system and method for controlling data communications between a server and a client device, such as a mobile device. Embodiments relate generally to a technique where stop data is provided to the client device. This stop data can be transmitted (e.g. by the client device) to the server. When processed by the server, the stop data indicates to the server that at least some of the encrypted data received by the client device from the server was not decrypted using the second key (e.g. as may be the case when the second key has been deleted). Upon receiving the stop data, the server may, for example, withhold the transmission of data encrypted with the first key to the client device until the second key is restored on the client device. In one embodiment, the stop data is provided to the client device in an encoded (e.g. encrypted) form.
    Type: Grant
    Filed: February 10, 2011
    Date of Patent: January 17, 2012
    Assignee: Research In Motion Limited
    Inventors: David Bajar, Phillip Chi-Jim Luk, Michael Kenneth Brown, Darrell Reginald May
  • Patent number: 8098826
    Abstract: A method of autocalibrating the timing of the laser in a quantum key distribution (QKD) system is disclosed. The laser generates photon signals in response to a laser gating signals from a controller. The method includes first performing a laser gate scan to establish the optimum laser gating signal arrival time corresponding to an optimum bit-error rate when exchanging photon signals between encoding stations of the QKD system. Once the optimum laser gating signal arrival time is determined, the laser gate scan is terminated and laser gate dithering is initiated. Laser gate dithering involves varying the arrival time of the laser gating signal around the optimum value of the arrival time. Laser gate dithering provides minor adjustments to the laser gating signal arrival time to ensure that the system operates at or near the optimum bit-error rate.
    Type: Grant
    Filed: April 20, 2005
    Date of Patent: January 17, 2012
    Assignee: MagiQ Technologies, Inc.
    Inventor: Jonathan Young
  • Patent number: 8094825
    Abstract: The invention relates to a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic device applying Digital Rights Management (DRM). In the method a master integrity key is obtained in a streaming node. An encrypted master integrity key is obtained in an electronic device. The encrypted master integrity key is decrypted in the electronic device. At least one session integrity key is formed in the streaming node and in the electronic device using at least the master integrity key and the integrity of at least one content stream is protected between the streaming node and the electronic device using the at least one session integrity key.
    Type: Grant
    Filed: September 12, 2008
    Date of Patent: January 10, 2012
    Assignee: Nokia Corporation
    Inventor: Sami Pippuri
  • Publication number: 20110320805
    Abstract: Implementations of methods of sharing data in a supply chain, the data corresponding to an item having a tag associated therewith, include generating data corresponding to the item, generating a data reference, encrypting the data using an encryption key to provide encrypted data, transmitting the encrypted data over a network for storage in a database based on the data reference, writing the data reference and the encryption key to the tag, and transferring the item to a successor in the supply chain. Implementations include retrieving information electronically stored on the tag, the information comprising a data reference and an encryption key, transmitting a data request over a network for retrieving encrypted data from a database, the data request comprising the data reference, receiving the encrypted data from the database, and decrypting the encrypted data using the encryption key to provide decrypted data.
    Type: Application
    Filed: June 28, 2010
    Publication date: December 29, 2011
    Applicant: SAP AG
    Inventors: Leonardo Weiss F. Chaves, Benjamin Bolland, Christian Loës, Hannes Thies, Pascal Wichmann
  • Patent number: 8078873
    Abstract: Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: December 13, 2011
    Assignee: Intel Corporation
    Inventors: Rahul C. Shah, Mark D. Yarvis
  • Patent number: 8068606
    Abstract: A method and system for embedding a secret in a bit string for safeguarding the secret. In one embodiment, the method comprises computing the length of the overall bit string as a function of q and t, where q and t are determined from the length of the secret. The method further comprises generating a plurality of information pieces based on q and t, the information pieces including a transformed secret and information for extracting the secret from the overall bit string. The method further comprises concatenating the plurality of information pieces to form the overall bit string.
    Type: Grant
    Filed: August 29, 2007
    Date of Patent: November 29, 2011
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 8068613
    Abstract: A virtual security coprocessor is created in a first processing system. The virtual security coprocessor is then transferred to a second processing system, for use by the second processing system. For instance, the second processing system may use the virtual security coprocessor to provide attestation for the second processing system. In an alternative embodiment, a virtual security coprocessor from a first processing system is received at a second processing system. After receiving the virtual security coprocessor from the first processing system, the second processing system uses the virtual security coprocessor. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 21, 2009
    Date of Patent: November 29, 2011
    Assignee: Intel Corporation
    Inventor: Vincent R. Scaralata
  • Patent number: 8059964
    Abstract: A QKD system (10) having two QKD stations (Alice and Bob) optically coupled by an optical fiber link (FL), wherein Bob includes a variable timing delay arranged between Bob's controller (CB) and modulator (MB) or detector unit (40). A set-up and calibration procedure is performed wherein delay DL2 is adjusted until the timings for the modulator and detector unit (TSB and TS42, respectively) are established. Delay DL2 is then fixed so that the detector unit and modulator operate in a common timing mode that is not changed if the synchronization signal is changed. The timing TSS of the synchronization (sync) signals (SS) sent from Alice to Bob is adjusted to arrive at optimum system performance. Once the QKD system is in operation, because the sync signal can drift, the sync signal timing TSS is dithered maintain optimum QKD system performance.
    Type: Grant
    Filed: July 20, 2007
    Date of Patent: November 15, 2011
    Assignee: MagiQ Technologies, Inc.
    Inventor: Harry Vig
  • Patent number: 8054978
    Abstract: A method for content access control operative to enable authorized devices to access protected content and to prevent unauthorized devices from accessing protected content, the method comprising: providing a plurality of authorized devices; dividing the plurality of authorized devices into a plurality of groups, each of the plurality of authorized devices being comprised in at least one of the plurality of groups, no two devices of the plurality of authorized devices being comprised in exactly the same groups; determining whether at least one device of the plurality of authorized devices is to be prevented from having access to the protected content and, if at least one device is to be prevented, removing all groups comprising the at least one device from the plurality of groups, thus producing a set of remaining groups; and determining an authorized set comprising groups from the set of remaining groups, such that each device of the plurality of authorized devices which was not determined, in the determining
    Type: Grant
    Filed: February 28, 2008
    Date of Patent: November 8, 2011
    Assignee: NDS Limited
    Inventor: Yevgeny Yakov (Gene) Itkis
  • Publication number: 20110271104
    Abstract: A method and system of securing content is described, the method including establishing communication between a secure module source and a content rendering device, loading a dynamically generated pseudo-unique secure module to the content rendering device from the secure module source, establishing communication between the secure module source and the dynamically generated pseudo-unique secure module, and transferring a decryption key from the secure module source to the dynamically generated pseudo-unique secure module, thereby enabling decryption of encrypted content, the encrypted content being encrypted according to the decryption key. Related methods and apparatus are also described.
    Type: Application
    Filed: September 27, 2006
    Publication date: November 3, 2011
    Applicant: NDS Limited
    Inventors: Leonid Sandler, Yaron Sella, Erez Waisbard
  • Patent number: 8051296
    Abstract: System and methods for initializing secure communications with lightweight devices are described herein. In one embodiment, the method includes enabling a device manager to securely communicate with a lightweight device, the method comprising receiving encrypted data from the device manager, wherein the device manager received the encrypted data from the lightweight device. In the embodiment, the method also includes decrypting the encrypted data to produce access information, wherein the access information enables the device manager to securely communicate with the lightweight device. In the embodiment, the method also includes securely transmitting the access information to the device manager.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: November 1, 2011
    Assignee: Honeywell International Inc.
    Inventor: Kevin R. Driscoll
  • Publication number: 20110211701
    Abstract: A method for generating encryption keys and for exchanging the parameters making it possible to generate the keys in a network comprising n entities X wishing to exchange data, the method includes the steps: the n entities elect a common array generator (GM(?)), at least one of the entities X communicates these values (?i) via several different routing paths Ci, plus a reference random number NX, NY, each entity X, Y generates an array Ts, each entity X, Y composes a secret key based on the generated array (Ts) and based on several values indexed by several pairs ((i,j); (k,l); . . . ; (o,p)) of said array in order to create its secret value, the random number of a first entity X is returned to a second entity Y, one of the n entities X, Y at least compares the consistency of the two values NX after decryption with its own key KXs.
    Type: Application
    Filed: December 18, 2008
    Publication date: September 1, 2011
    Inventors: Eric Grall, Nicolas Sintes
  • Publication number: 20110213977
    Abstract: Embodiments described herein are generally directed to methods and devices in which computing devices, and mobile devices in particular, establish a shared encryption key for a device group comprising at least three mobile devices. In accordance with one example embodiment, a public key of a mobile device is computed using a shared password as performed in accordance with authentication acts of a password-authenticated key exchange protocol, and transmitted to at least one other mobile device of the group. A public value is computed as a function of a mobile device private key and of a public key of at least one other mobile device of the device group, in accordance with a group key establishment protocol. The public values of the mobile devices of the device group are used to compute a shared encryption key.
    Type: Application
    Filed: February 26, 2010
    Publication date: September 1, 2011
    Applicant: RESEARCH IN MOTION LIMITED
    Inventor: Herbert A. Little
  • Publication number: 20110202768
    Abstract: An apparatus and a method for managing identity data are disclosed, which can recover lost or deleted ID data stored in a user terminal and prevent a malicious user to plagiarize a user's ID. The apparatus includes a user ID management device (1), a back-up server (2) and a website system (3). The user ID management device (1) installed in a user's terminal allows ID data to be used on a website. The user ID management device (1) includes an ID management unit (10), a data storing unit (12), a back-up requesting unit (14) and a recovery requesting unit (16). A back-up server (2) backs up and stored ID data from the user ID management device (1). The back-up server includes a data storing unit (20), a back-up processing unit (22), a recovery processing unit (24), a suspension receiving unit (26) and a suspension requesting unit (28). A website system (3) includes a user account management unit (30), a suspension processing unit (32) and a recovery processing unit (34).
    Type: Application
    Filed: December 11, 2009
    Publication date: August 18, 2011
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Daeseon Choi, Deokjin Kim, Soohyung Kim, Seunghyun Kim, Jonghyouk Noh, Kwansoo Jung, Sangrae Cho, Youngseob Cho, Jinman Cho, Seunghun Jin
  • Patent number: 8000478
    Abstract: A key handshake method in a wireless local area network (LAN) capable of performing authentication between two wirelessly connected stations by exchanging keys once is provided. Because the security key for authentication can be exchanged by one 4-way handshake between an authenticator and a supplicant in a wireless LAN, an authentication delay can be prevented.
    Type: Grant
    Filed: May 23, 2006
    Date of Patent: August 16, 2011
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Marcus Wong, Sergey Bezzateev
  • Publication number: 20110194691
    Abstract: Embodiments of the invention discloses a system and a method for determining an encrypted edit distance as an encryption of a minimum cost of transformation of a first sequence into a second sequence based on an insertion cost, a deletion cost, and a substitution cost. The method determines recursively a current element of the matrix as an encryption of a minimum of a first element, a second element, and a third element to produce the dynamic programming solution, wherein the first element represents the insertion cost, the second element represents the deletion cost, and the third element represents the substitution costs, and wherein the current element, the first element, the second element, and the third element are homomorphically encrypted with a public key; and selects the dynamic programming solution as the encrypted edit distance, wherein steps of the method are performed by a first processor and a second processor.
    Type: Application
    Filed: February 9, 2010
    Publication date: August 11, 2011
    Inventors: Shantanu Rane, Wei Sun
  • Patent number: 7995761
    Abstract: A data providing system is provided which includes: a storage section which stores an encoded file obtained by encoding a data file to be distributed with a predetermined common key and an encoded information file obtained by encoding an information data file including information on the common key with a private key different from the common key; and a file transfer section which transfers the encoded file and the encoded information file from the storage section to external electronic device.
    Type: Grant
    Filed: January 10, 2008
    Date of Patent: August 9, 2011
    Assignee: Kyocera Mita Corporation
    Inventors: Sachiko Yoshimura, Takanao Kawai
  • Patent number: 7994915
    Abstract: An information processing apparatus includes an equipment means equipped on a predetermined portion of a living body and has a storage means which a first biological identification data associated with the predetermined portion of the living body, and a communication means which is held by the equipment means and transmits the first biological identification data to a communication target to which the predetermined position equipped with the equipment means is brought close. A biological authentication means which performs biological authentication, based on the first biological identification data and on a second biological identification data, said second biological identification data being extracted from biological information detected by a biological sensor.
    Type: Grant
    Filed: October 27, 2005
    Date of Patent: August 9, 2011
    Assignee: Sony Corporation
    Inventor: Hideo Sato
  • Patent number: 7991739
    Abstract: This invention involves tracking and backing all the information that a user generates on its computer devices (including embedded devices) in real time. The local user server records all user actions and gestures (via various means that include TV cameras). All of this information (user actions and saved files in a computer) is then sent to a remote server via the Internet. This remote server has a virtual map of all the embedded devices on a computer that the person uses. The remote server immediately starts to interpret the user's actions (including user gestures). In one implementation, the invention stores user actions that are related to data generation (e.g. actions that called some links where data is stored, or executed some programs that generated data). In another variant the remote server generates and downloads the same files that are downloaded on the local user computer devices.
    Type: Grant
    Filed: May 21, 2008
    Date of Patent: August 2, 2011
    Assignee: International Business Machines Corporation
    Inventors: Dimitri Kanevsky, Alexander Zlatsin
  • Publication number: 20110176682
    Abstract: Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the client. The authentication methods include presenting a specified token to the user sufficient to authenticate the client to the user and thus protect the user-provided PIN. Security is strengthened by using an integrity key based on approved client system configurations. Security is further strengthened by calculating a PIN? value based on a user-specified PIN and a modifier and using the PIN? value for unlocking the smart card.
    Type: Application
    Filed: March 26, 2011
    Publication date: July 21, 2011
    Applicant: Microsoft Corporation
    Inventors: Stefan Thom, Erik Lee Holt, Shivaram H. Mysore, Valerie Kathleen Bays, Carl M. Ellison
  • Patent number: 7983987
    Abstract: In a secure electronic payment system, authentication data based on a payment account (e.g., a credit card account) is sent from an authentication server, through a user's Web browser, to a merchant's computer. The merchant's computer sends the authentication data to a computer operated by the issuer of the payment account, either through a payment organization computer or through an acquirer computer operated by the merchant's acquirer. The issuer's computer verifies the authorization request message, thereby generating an authorization response message. The authorization response message is forwarded to the merchant's computer, either through the payment organization computer or through the acquirer computer. If the authorization response message indicates that the verification was successful, the transaction is completed.
    Type: Grant
    Filed: January 30, 2003
    Date of Patent: July 19, 2011
    Assignee: MasterCard International Incorporated
    Inventors: Arthur D. Kranzley, Stephen W. Orfei, Bruce J. Rutherford