Key Sequence Signal Combined With Data Signal Patents (Class 380/43)
-
Patent number: 9497021Abstract: Device for generating a message authentication code for authenticating a message, wherein the message is divided in blocks (M) with a specified block length, the device comprising a generating unit for generating the message authentication code based on a message by using a block cipher algorithm, and an encrypting unit for performing an exclusive disjunction on the last block with a first key (K1, K2) and for performing an exclusive disjunction on the first and/or the last block additionally with a second key (K3, K4) for generating the message authentication code.Type: GrantFiled: August 27, 2010Date of Patent: November 15, 2016Assignee: NXP B.V.Inventors: Bruce Murray, Pieter Janssens
-
Patent number: 9489533Abstract: A method for improving memory utilization in a dispersed storage network (DSN). After a data object is received for storage in the DSN, it is determined whether a substantially identical data portion of the data object has previously been encrypted and stored. The determination may be made, for example, by comparing a portion reference value relating to the data object to portion reference information stored in DSN memory. If not detected, the data object is encrypted using an encryption pattern sequence and encryption key, at least one of which substantially identical to at least a portion of the data portion. The encrypted data object is then compressed using a pattern based data compression function, and the compressed data object is stored. The portion reference value is also stored in DSN memory.Type: GrantFiled: June 23, 2014Date of Patent: November 8, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gary W. Grube, Timothy W. Markison, S. Christopher Gladwin, Jason K. Resch, Wesley Leggette, Andrew Baptist
-
Patent number: 9197599Abstract: The specification discloses a method of doing business over the public Internet, particularly, a method which enables access to legacy management tools used by a telecommunications enterprise in the management of the enterprise business to the enterprise customer, to enable the customer to more effectively manage the business conducted by the customer through the enterprise, this access being provided over the public Internet. This method of doing business is accomplished with one or more secure web servers which manage one or more secure client sessions over the Internet, each web server supporting secure communications with the client workstation; a web page backplane application capable of launching one or more management tool applications used by the enterprise.Type: GrantFiled: September 24, 1998Date of Patent: November 24, 2015Assignee: VERIZON PATENT AND LICENSING INC.Inventors: B. Reilly Barry, Mark A. Chodoronek, Eric DeRose, Carol Y. Devine, Mark N. Studness, Angela R. James, Michael Tusa
-
Patent number: 9191251Abstract: A multilevel signal transmitting apparatus determines a voltage level indicating an original data signal, and generates a multilevel data signal including a plurality of unit time intervals each having the determined voltage level. The multilevel signal transmitting apparatus assigns an even number of voltage levels to each unit time interval, assigns a smaller number of voltage levels than a maximum number of voltage levels, to a unit time interval next to a unit time interval to which the maximum number of voltage levels are assigned, and determines one of the assigned voltage levels, as the voltage level indicating the original data signal. A multilevel signal receiving apparatus detects the voltage level of the multilevel data signal, and reproduces the original data signal, based on the assigned voltage levels and the detected voltage level.Type: GrantFiled: September 29, 2014Date of Patent: November 17, 2015Assignee: Panasonic Intellectual Property Management Co., Ltd.Inventor: Osamu Shibata
-
Patent number: 9042551Abstract: A semiconductor structure including a device configured to receive an input data-word. The device including a logic structure configured to generate an encrypted data-word by encrypting the input data-word through an encrypting operation. The device further including an eFuse storage device configured to store the encrypted data-word as eFuse data by blowing fuses in accordance with the encrypted data-word.Type: GrantFiled: June 4, 2012Date of Patent: May 26, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: John A. Fifield, Gerald P. Pomichter, Jr.
-
Patent number: 8989379Abstract: Systems and methods for authenticating key rotation communications. Key rotation communications can include a key counter known to both a headend device and a station. Comparison between a local key counter and the key counter included in the key rotation communication can be used to authenticate the key rotation communication.Type: GrantFiled: January 9, 2008Date of Patent: March 24, 2015Assignee: QUALCOMM IncorporatedInventors: Srinivas Katar, Lawrence W. Yonge, Manjunath Krishnam
-
Patent number: 8949625Abstract: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Encryption and decryption engines may include embedded-format-preserving encryption and decryption engines. Embedded-format-preserving encryption engines may be used to encrypt data strings and embed information in data strings. Information corresponding to a format-preserving encryption operation of a data string may be embedded in an associated data string. The associated data string may be encrypted before or after embedding the information in the associated data string. The embedded information may include key management data that corresponds to a managed encryption key that was used to encrypt the data string.Type: GrantFiled: January 30, 2012Date of Patent: February 3, 2015Assignee: Voltage Security, Inc.Inventors: Terence Spies, Philip Hillyer Smith, III
-
Patent number: 8886960Abstract: A microprocessor includes an architected register having a bit. The microprocessor sets the bit. The microprocessor also includes a fetch unit that fetches encrypted instructions from an instruction cache and decrypts them prior to executing them, in response to the microprocessor setting the bit. The microprocessor saves the value of the bit to a stack in memory and then clears the bit, in response to receiving an interrupt. The fetch unit fetches unencrypted instructions from the instruction cache and executes them without decrypting them, after the microprocessor clears the bit. The microprocessor restores the saved value from the stack in memory to the bit in the architected register, in response to executing a return from interrupt instruction. The fetch unit resumes fetching and decrypting the encrypted instructions, in response to determining that the restored value of the bit is set.Type: GrantFiled: October 29, 2013Date of Patent: November 11, 2014Assignee: VIA Technologies, Inc.Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
-
Patent number: 8880902Abstract: A microprocessor is provided with a method for decrypting encrypted instruction data into plain text instruction data and securely executing the same. The microprocessor includes a master key register file comprising a plurality of master keys. Selection logic circuitry in the microprocessor selects a combination of at least two of the plurality of master keys. Key expansion circuitry in the microprocessor performs mathematical operations on the selected master keys to generate a decryption key having a long effective key length. Instruction decryption circuitry performs an efficient mathematical operation on the encrypted instruction data and the decryption key to decrypt the encrypted instruction data into plain text instruction data.Type: GrantFiled: October 29, 2013Date of Patent: November 4, 2014Assignee: VIA Technologies, Inc.Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
-
Patent number: 8837719Abstract: The invention relates to the general field of digital security and more particularly cryptography. In particular it proposes a device and a method of encrypting a sequence of data. The invention also relates to a cryptographic device (1) and a cryptographic method of generating a pseudo-random data sequence (13) and their favored use in the field of digital security, in particular for encrypting and decrypting data and for cryptographically hashing messages.Type: GrantFiled: June 4, 2008Date of Patent: September 16, 2014Assignee: OridaoInventor: Nicolas Reffe
-
Patent number: 8825928Abstract: A device or “dongle” (30) is provided for controlling communications between a Subscriber Identity Module (or SIM) (12), such as of the type used in a GSM cellular telephone system, and a computer, such as a WINDOWS® operating system-based PC (10). The SIM (12) can be authenticated by the telephone network, in the same way as for authenticating SIMs of telephone handset users in the network, and can in this way authenticate the user of the PC (10) or the PC (10) itself. Such authentication can, for example, permit use of the PC (10) for a time-limited session in relation to a particular application which is released to the PC (10) after the authentication is satisfactorily completed. The application may be released to the PC (10) by a third party after and in response to the satisfactory completion of the authentication process. A charge for the session can be debited to the user by the telecommunications network and then passed on to the third party.Type: GrantFiled: October 9, 2003Date of Patent: September 2, 2014Assignee: Vodafone Group PLCInventors: David Jeal, George Stronach Mudie
-
Patent number: 8811609Abstract: An information protection system includes a mobile terminal and an encryption module. The mobile terminal requests a key sequence by transmitting a message including a Personal Identification Number (PIN) number input by a user, and encrypts or decrypts one or more communication signals, including voice signals and data signals, based on the key sequence when the key sequence is received. The encryption module is connected to the mobile terminal. The encryption module encrypts a security key using the identifier and the PIN number of the mobile terminal, decrypts the encrypted security when requested by the mobile terminal, and transmits the key sequence generated based on the decrypted security key to the mobile terminal.Type: GrantFiled: February 15, 2012Date of Patent: August 19, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Sang-Hyun Park, Jun-Ho Lee, Haeng-Seok Ko, Myung-Won Seo, In-Jung Kim, Jang-Hong Yoon
-
Patent number: 8788811Abstract: A method and system for server-side key generation for non-token clients is described.Type: GrantFiled: May 28, 2010Date of Patent: July 22, 2014Assignee: Red Hat, Inc.Inventors: Christina Fu, Andrew Wnuk
-
Patent number: 8781114Abstract: An apparatus for recognizing a failure in a cryptographic unit, wherein the cryptographic unit includes a determinator for determining an input control signal and an output control signal, with the determinator being formed to determine the input control signal on the basis of an encryption of an input control signal parity of a group of input signals or an input signal of the group of input signals with an encryption number and to determine the output control signal on the basis of an encryption of an output control signal parity of a group of the output signals or an output signal of the group of output signals with the encryption number. Furthermore, the apparatus for recognizing includes an evaluator for evaluating the input control signal and the output control signal to recognize a failure of the cryptographic unit on the basis of a comparison between the input control signal and the output control signal.Type: GrantFiled: September 7, 2005Date of Patent: July 15, 2014Assignee: Infineon Technologies AGInventors: Berndt Gammel, Michael Goessel, Rainer Goettfert
-
Patent number: 8769289Abstract: A user accessing a protected resource is authenticated using multiple channels, including a mobile device of the user. A user attempting to access a protected resource is authenticated by receiving a request from a mobile device of the user to access the protected resource; receiving a public key from the mobile device of the user; providing a provision token to the mobile device, wherein the provision token is used by the user to access the protected resource using a second device; and confirming the provision token to a provider of the protected resource to authorize the user to access the protected resource. The user then communicates with the provider using a second device to authorize the provisioning token. A transaction signing protocol is also provided.Type: GrantFiled: September 14, 2012Date of Patent: July 1, 2014Assignee: EMC CorporationInventor: Boris Kronrod
-
Patent number: 8726123Abstract: A bit error corrector includes an aging bit pattern memory operable to store at least one aging bit pattern which conveys aging-related effects within a succession of uncorrected bit patterns, a bit pattern modifier operable to modify a current, uncorrected bit pattern using the at least one aging bit pattern and generate a modified bit pattern, and a bit pattern comparator operable to compare the current uncorrected bit pattern with a corrected bit pattern which is based on the modified bit pattern and determine a corresponding comparative bit pattern. An aging bit pattern determiner is operable to recursively determine a new aging bit pattern based on the at least one aging bit pattern and the comparative bit pattern, and store the new aging bit pattern in the aging bit pattern memory for use during modification of a subsequent uncorrected bit pattern by the bit pattern modifier.Type: GrantFiled: July 13, 2012Date of Patent: May 13, 2014Assignee: Infineon Technologies AGInventors: Rainer Goettfert, Berndt Gammel, Thomas Kuenemund
-
Patent number: 8712049Abstract: A system for implementing dynamic pseudorandom keyboard remapping includes a keyboard in communication with an operating system of a computing device; the keyboard configured to encrypt an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and the operating system configured to decrypt the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard thereto, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value.Type: GrantFiled: September 11, 2007Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Wayne M. Delia, Edward E. Kelley, Franco Motika
-
Patent number: 8711751Abstract: Methods and apparatus that reduce user identification overhead for communications. In one aspect of the invention, a reciprocal transmission channel characteristic (e.g., the channel impulse response) is used to derive shared and anonymous user identification between two wireless devices. In one embodiment, subscription-less data transmissions are broadcast from a base station to multiple user equipment, each user equipment receiving its correspondingly identified subscription-less data. The use of quantization levels and/or levels of tolerance for compensating for non-ideal differences in recipient and transmitter channel characteristics are also disclosed.Type: GrantFiled: September 25, 2009Date of Patent: April 29, 2014Assignee: Apple Inc.Inventors: Markus Mueck, Andreas Schmidt
-
Patent number: 8712050Abstract: A method of implementing dynamic pseudorandom keyboard remapping of a system including a keyboard in communication with an operating system of a computing device includes encrypting an original keyboard scan code corresponding to each of a plurality of keyboard keys, using a mapping algorithm, wherein the mapping algorithm encrypts the original keyboard scan code by using both the original keyboard scan code and a current one of a sequence of pseudorandom numbers generated using a pseudorandom number generator (PRNG) algorithm and an initial seed value; and decrypting the original keyboard scan code based on an encrypted scan code generated and transmitted from the keyboard to the operating, responsive to a keystroke of the keyboard, wherein the operating system also uses the mapping algorithm, the PRNG algorithm, and the initial seed value.Type: GrantFiled: September 11, 2007Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Wayne M. Delia, Edward E. Kelley, Franco Motika
-
Patent number: 8707224Abstract: A method of simplifying a combinational circuit establishes an initial combinational circuit operable to calculate a set of target signals. A quantity of multiplication operations performed in a first portion of the initial combinational circuit is reduced to create a first, simplified combinational circuit. The first portion includes only multiplication operations and addition operations. A quantity of addition operations performed in a second portion of the first, simplified combinational circuit is reduced to create a second, simplified combinational circuit. The second portion includes only addition operations. Also, the second, simplified combinational circuit is operable to calculate the target signals using fewer operations than the initial combinational circuit.Type: GrantFiled: September 14, 2012Date of Patent: April 22, 2014Assignees: The United States of America, as Represented by the Secretary of Commerce, The National Institute of Standards & Technology, University of Southern DenmarkInventors: Rene Caupolican Peralta, Joan Boyar
-
Patent number: 8699703Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating data via a pseudo-random polymorphic tree. A server, using a seed value shared with a client device, generates a tag stream according to a byte-string algorithm. The server passes the tag stream and the data to be transmitted to the client device through a pseudo-random polymorphic tree serializer to generate a pseudo-random polymorphic tree, which the server transmits to the client device. The client device, using the same seed and byte-string algorithm, generates the same tag stream as on the server. The client passes that tag stream and the received pseudo-random polymorphic tree through a pseudo-random polymorphic tree parser to extract the data. Data to be transmitted from the server to the client device is hidden in a block of seemingly random data, which changes for different seed values. This approach obfuscates data and has low processing overhead.Type: GrantFiled: October 19, 2011Date of Patent: April 15, 2014Assignee: Apple Inc.Inventors: Nicholas T. Sullivan, Bertrand Mollinier Toublet, Gianpaolo Fasoli, Jon McLachlan
-
Patent number: 8694789Abstract: A system and method for generating a non-repudiatable record of a communications data stream is provided, which is applicable to real-time and quasi-real-time data streams. A binary communication data stream is captured and segmented into defined frames. A key frame is generated for each of a number of data frames containing integrity and authentication information. The key frame is inserted into the data stream to provide an authenticated data stream.Type: GrantFiled: December 17, 2009Date of Patent: April 8, 2014Assignee: Avaya Inc.Inventor: Peter Chapman
-
Patent number: 8693682Abstract: A system for encryption, and subsequent decryption, of encoded data allows for transcoding of the encrypted data. The data is encoded in such a way that different packets have different importance levels, so that some or all of the packets at the lower importance levels can be discarded or truncated in order to reduce the data rate. This is achieved by introducing dependencies into the encoding process. The packets at the highest importance level are encoded with reference only to other packets at the highest importance level, while the encoding of packets at lower importance levels also depend on the encoding of the packets at the highest importance level. The encoded data is then encrypted in such a way that the encryption process has dependencies that correspond to the dependencies in the encoding process.Type: GrantFiled: March 25, 2010Date of Patent: April 8, 2014Assignee: SQR Systems LtdInventors: Nithin Mohan Thomas, David Roger Bull, David Wallace Redmill
-
Patent number: 8687799Abstract: When an encryption processing circuit encrypts data, a current flows in the encryption processing circuit. A noise current generated by a noise generation circuit is superimposed on the current consumed by the encryption processing circuit. The present invention is applicable to an IC chip that encrypts plaintext data using a key, thus preventing the key from being broken by DPA attacks based on analysis of the current consumption to provide high security.Type: GrantFiled: February 17, 2005Date of Patent: April 1, 2014Assignee: Sony CorporationInventors: Shigeru Arisawa, Seiji Esaka
-
Patent number: 8683225Abstract: A microprocessor includes an architected register having a bit (may be x86 EFLAGS register reserved bit) set by the microprocessor. A fetch unit fetches encrypted instructions from an instruction cache and decrypts them (via XOR) prior to executing them, in response to the microprocessor setting the bit. The microprocessor saves the bit value to a stack in memory and then clears the bit in response to receiving an interrupt. The fetch unit fetches unencrypted instructions from the instruction cache and executes them without decrypting them after the microprocessor clears the bit. The microprocessor restores the saved value from the stack in memory to the bit in the architected register (and in one embodiment, also restores decryption key values) in response to executing a return from interrupt instruction. The fetch unit resumes fetching and decrypting the encrypted instructions in response to determining that the restored value of the bit is set.Type: GrantFiled: April 21, 2011Date of Patent: March 25, 2014Assignee: VIA Technologies, Inc.Inventors: G. Glenn Henry, Terry Parks, Brent Bean, Thomas A. Crispin
-
Patent number: 8660261Abstract: An encryption-enabled entropy coder for a multimedia codec is disclosed. The entropy coder implements a randomized Huffman coding scheme without storing multiple sets of Huffman tables in a ROM. The entropy coder includes a ROM storing a single set of code tables, a table lookup section coupled to the ROM which converts symbols to original codewords and vice versa by performing table lookup, and a table randomizer section for converting original Huffman codewords to randomized Huffman codewords and vice versa using an isomorphic code generator algorithm. The table randomizer section performs the conversion based on a key hopping sequence generated by a pseudorandom bit generator using an encryption/decryption key.Type: GrantFiled: June 4, 2009Date of Patent: February 25, 2014Assignee: Mediatek Singapore Pte. Ltd.Inventors: Yu-Lin Chang, Wensheng Zhou
-
Patent number: 8638361Abstract: An endoscope apparatus has a transmission device of an endoscope and a reception device of a processor. The transmission device calculates a DC balance value of input data, compares the DC balance value and a cumulative value thereof, and compares the sign of the DC balance value and the sign of the cumulative value. When the signs are the same sign, the transmission device generates intermediate data by exchanging a first value and a second value with each other for all the bits of the input data, and generates predetermined information indicating that all the bits have been inverted. When the signs are different signs, the transmission device performs a process of setting the input data as the intermediate data and transmits the intermediate data by a serial signal.Type: GrantFiled: December 6, 2012Date of Patent: January 28, 2014Assignee: Olympus Medical Systems Corp.Inventors: Takahiro Tanabe, Susumu Kawata
-
Patent number: 8601598Abstract: A system that enables a cloud-based data repository to function as a secure ‘drop-box’ for data that corresponds to a user is provided. The ‘drop box’ can be facilitated through the use of cryptographic keying technologies. For instance, data that is ‘dropped’ by or on behalf of a particular user can be encrypted using a public key that corresponds to a user-specific private key. Thus, although the data resides within the large pool of ‘cloud-based’ data, it is protected since it can only be decrypted by using the private key, which is kept secret. The innovation can further facilitate user-centric secure storage by partitioning the cloud-based repository into multiple partitions, each of which corresponds to specific indexing criteria.Type: GrantFiled: September 29, 2006Date of Patent: December 3, 2013Assignee: Microsoft CorporationInventors: Raymond E Ozzie, William H. Gates, III, Thomas F. Bergstraesser, Lili Cheng, Michael Connolly, Alexander G. Gounares, Henricus Johannes Maria Meijer, Debi P. Mishra, Ira L. Snyder, Jr., Melora Zaner-Godsey
-
Patent number: 8582779Abstract: A system and method for secure communications in a communication system, wherein the system programs a computer to perform the method, which includes: receiving at least one authentication key, without an encryption key, from a key-management server; receiving a packet, which is encrypted, from a source device; authenticating the packet, using the at least one authentication key, without cryptographically altering the packet; and forwarding the authenticated packet to a destination device of the packet.Type: GrantFiled: December 19, 2010Date of Patent: November 12, 2013Assignee: Motorola Solutions, Inc.Inventors: Thomas S. Messerges, Adam C. Lewis
-
Patent number: 8577039Abstract: There is provided a cryptographic communication apparatus for conducting a key exchange procedure with another cryptographic communication apparatus that shares a password. The apparatus includes a first encryption unit that encrypts information that is based on a first random number using a public key of the another apparatus, a second encryption unit that encrypts the information that is based on the first random number encrypted by the first encryption unit using the password, a third encryption unit that encrypts information that is based on a second random number using the first random number, and transmits a first signal and a second signal to the another apparatus, the first signal including the information that is based on the first random number encrypted by the second encryption unit, and the second signal including information that is based on the second random number encrypted by the third encryption unit.Type: GrantFiled: April 25, 2012Date of Patent: November 5, 2013Assignee: Panasonic CorporationInventor: Masakatsu Matsuo
-
Patent number: 8548163Abstract: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that reduces the overall number of doubling and addition operations thereby providing an efficient method for multiple scalar multiplication. The elements in the pairs for P and Q method are combined into a single pair, and the bits in k and s are evaluated at each step as bit pairs. When the bits in k and s are equal, only one doubling operation and one addition operation are needed to compute the current pair, and when the bits in k and s are not equal, only one doubling operation is needed and two addition operations.Type: GrantFiled: September 13, 2012Date of Patent: October 1, 2013Assignee: Certicom Corp.Inventors: Adrian Antipa, Yuri Poeluev
-
Patent number: 8542824Abstract: A system and method for processing messages with encryptable message parts. When constructing an encoded message, an encryption key of a plurality of identified encryption keys is used to encrypt message data of a message part. A key identifier is associated with the message part and identifies the encryption key used for the encryption of the message data of the message part. In at least one exemplary embodiment, encryption keys that are used to encrypt message data of message parts are provided in a separate message part, arranged by key identifier. In particular, the encryption keys, arranged by key identifier, may be provided in exactly one message part separate from the message parts containing message data. This allows for a compact message encoding.Type: GrantFiled: May 4, 2006Date of Patent: September 24, 2013Assignee: BlackBerry LimitedInventors: Michael K. Brown, Michael G. Kirkup, Michael S. Brown
-
Patent number: 8542825Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.Type: GrantFiled: June 10, 2011Date of Patent: September 24, 2013Assignee: Adobe Systems IncorporatedInventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh
-
Patent number: 8510568Abstract: A content import method in a digital rights management (DRM) system imports transport streams received from outside a domain, generates a content file, and regularly inserts information in the form of transport packets necessary for decrypting encrypted content into a payload of the content file. Accordingly, even if usage constraint information (UCI) included in the received content changes, packaging is possible. When a device pertaining to the domain receives half of an imported content file via streaming, transport packets of the received half of the imported content file can be promptly decrypted without a time delay.Type: GrantFiled: September 7, 2006Date of Patent: August 13, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Bong-seon Kim, Young-sun Yoon
-
Patent number: 8488786Abstract: A method of managing the sending of multimedia contents to a mobile terminal (2) equipped with a security module (3), the multimedia contents being sent in encrypted form from a broadcast server (1) and via a communications network (4). The method comprises the following steps: a) sending to the mobile terminal (2) rights-of-use data for a multimedia content, b) storing said rights-of-use data in the security module (3) of the mobile terminal (2), c) generating a series of encryption/decryption keys, the series of decryption keys being generated from rights-of-use data stored in the security module (3), d) sending the multimedia content to the mobile terminal (2), the content being encrypted with successive keys from the series of encryption keys that has been generated, and e) the mobile terminal receiving the multimedia content and decrypting the multimedia content using the decryption keys from the series of decryption keys generated in the security module of the mobile terminal.Type: GrantFiled: April 6, 2006Date of Patent: July 16, 2013Assignee: France TelecomInventors: Axel Ferrazzini, Diego Anza, Pascal Chauvaud
-
Patent number: 8467536Abstract: A key message can include a key-encryption-key (KEK) associated with a KeyDomainID and a KeyGroupID. A session description message can describe streaming media initialization parameters containing media stream information for one or more media streams. For each media stream, the media stream information can include an IP address and a data port. The session description message can further contain a linkage for binding the KEK to a corresponding one of the media streams. The linkage can include the KeyDomainID and KeyGroupID or can include an abstract representation of the KeyDomainID and KeyGroupID. During session initialization, the key-encryption-key (KEK) can be bound to the media streams using the linkage of the session description message. Each of the media streams can be secured using a traffic key conveyed to user equipment (UE) under protection of the key-encryption-key (KEK).Type: GrantFiled: December 8, 2010Date of Patent: June 18, 2013Assignee: Motorola Solutions, Inc.Inventors: Adam C. Lewis, Thomas S. Messerges
-
Patent number: 8457310Abstract: A print system which are capable of inhibiting simultaneous use of the encrypted print and the box storage to thereby increase the security of print data. A host computer has an encryption function of encrypting print data, and issues a print job for the print data encrypted by the encryption function. A print server receives the issued print job, and has a decryption function of decrypting the encrypted print data of the received print job. A printer has a storage function of storing the print data decrypted by the decryption function, and outputs the stored print data. At least one of the host computer and the print server inhibits simultaneous use of the encryption function and the storage function.Type: GrantFiled: November 24, 2010Date of Patent: June 4, 2013Assignee: Canon Kabushiki KaishaInventors: Hiroshi Uchikawa, Yushi Matsukubo, Fumio Mikami, Yoshinobu Umeda, Tadashi Kawaguchi, Yoshio Kimura, Yasuhiko Hirano, Hitoshi Imai, Hiroyasu Morita
-
Patent number: 8457313Abstract: A bit sequence, which is contained in a signalling message and which is known to a network unit and to a communications terminal which receives the signalling message from the network unit, informs the communications terminal that a test value is contained in a signalling message. The test value received by the communications terminal is compared with a test value computed by the communications terminal, and the communications terminal defines a signalling message as being unmodified only in the event that the bit sequence contained in a signalling message has been received and the comparison of both test values yields a positive result.Type: GrantFiled: March 15, 2005Date of Patent: June 4, 2013Assignee: Siemens AktiengesellschaftInventor: Robert Zaus
-
Publication number: 20130114807Abstract: An exemplary information sharing method is provided. The information sharing method includes a step of: broadcasting predetermined sharing information to a user terminal(s) within a preset region on a client side in response to a sharing request while an information sharing function is enable. An information sharing module, device and electronic apparatus using the same are also provided.Type: ApplicationFiled: February 8, 2012Publication date: May 9, 2013Applicant: National Taiwan UniversityInventors: Liang-Gee CHEN, Tien-Ju YANG, Yi-Min TSAI
-
Patent number: 8437739Abstract: A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key.Type: GrantFiled: August 18, 2008Date of Patent: May 7, 2013Assignee: QUALCOMM IncorporatedInventors: Ravindra Patwardhan, Fatih Ulupinar, Parag Arun Agashe, Rajat Prakash
-
Patent number: 8433456Abstract: A system and method for controlling power windows of a vehicle includes a receiver mounted on the vehicle for receiving an open window request signal wirelessly from a portable device, at least one exterior condition sensor mounted on the vehicle for detecting an adverse exterior condition relative to the vehicle, and a controller mounted on the vehicle for communicating with the receiver and the at least one exterior condition sensor. The controller commands opening of the one or more power windows when the receiver receives the open window request signal provided the at least one exterior condition sensor does not detect an adverse exterior condition relative to the vehicle.Type: GrantFiled: February 4, 2010Date of Patent: April 30, 2013Assignee: Honda Motor Co., Ltd.Inventors: David G. Peterson, Brian K. Lickfelt, John Sgueglia, Trevor Scott Whitten
-
Patent number: 8428253Abstract: A processing method of content intended for broadcasting is disclosed. The method includes, preceding broadcasting: encryption of the content by a plurality of control words, reservation of locations intended to receive a control message in the encrypted content, marking of each location with location information in the content, and storage of a key file comprising the control words. During broadcasting, the method includes: transmission of the encrypted content to a video server, transmission of the key file to a control message generator, broadcasting of the content encrypted by the video server, interception of the video server output by a replacement module, detection, by the replacement module, of location information of control messages in the stream of the broadcasted content, and application of the control messages at locations provided for this purpose by the replacement module.Type: GrantFiled: April 21, 2005Date of Patent: April 23, 2013Assignee: Nagravision S.A.Inventors: Jean-François Collet, Olivier Brender
-
Patent number: 8406425Abstract: An approach is provided for minimizing co-channel interference in a communication system is disclosed. A header of a first frame is scrambled based on a first unique word. A header of a second frame is scrambled based on a second unique word. The first frame including the corresponding scrambled header and the second frame including the corresponding scrambled header are transmitted, respectively, over adjacent co-channels of the communication system. Each of the frames further includes a payload and a pilot block. The payload and the pilot block of the first frame are scrambled based on a first scrambling sequence. The payload and the pilot block of the second frame are scrambled based on a second scrambling sequence. The above arrangement is particularly suited to a digital satellite broadcast and interactive system.Type: GrantFiled: June 9, 2006Date of Patent: March 26, 2013Assignee: DTVG Licensing, Inc.Inventors: Lin-Nan Lee, Feng-Wen Sun, Adam Von Ancken
-
Patent number: 8385541Abstract: The method of performing elliptic polynomial cryptography with elliptic polynomial hopping allows for the encryption of messages through elliptic polynomial cryptography, i.e., using elliptic polynomials with multi x-coordinates, and particularly with the utilization of elliptic polynomial hopping based upon both the elliptic polynomial and its twist, regardless of whether the elliptic polynomial and its twist are isomorphic with respect to one another. Each plaintext block is encrypted by a different elliptic polynomial, and the elliptic polynomials used are selected by an initial secret key and a random number generator. The method is particularly useful for symmetric encryption systems, and provides a block cipher fundamentally based upon a computationally hard problem.Type: GrantFiled: February 18, 2010Date of Patent: February 26, 2013Assignee: King Fahd University of Petroleum and MineralsInventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
-
Patent number: 8370635Abstract: A method for synchronization of a digital watermark generates a digital watermark based on feature extraction and a key generator. The synchronization method is adapted for both temporal and spatial synchronization. Statistical features of the watermarked signal along with key generators are used to compute keys used to detect embedded digital watermarks that vary over time or space. For spatial synchronization, spatial redundancy is used to detect geometric distortion of a signal in which the watermark is embedded using an autocorrelation method to detect peaks caused by the redundancy of the watermark structure. These peaks are then analyzed with a histogram method to detect rotation and scaling of the host media signal. The spatial synchronization process is applied to watermarks for both intra-coded frames of video (I-frames) as well as still images.Type: GrantFiled: November 22, 2010Date of Patent: February 5, 2013Assignee: Purdue Research FoundationInventors: Edward J. Delp, Eugene T. Lin
-
Patent number: 8351601Abstract: Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of secret keys in the message bit string. The method of performing elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.Type: GrantFiled: February 18, 2010Date of Patent: January 8, 2013Assignee: King Fahd University of Petroleum and MineralsInventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
-
Patent number: 8339678Abstract: An apparatus, system, and method for image processing are disclosed, each of which obtains a mark from image data, detects additional information in the mark, determines whether the mark is detected in the mark to generate a determination result, and controls processing performed by an image processing apparatus with respect to the image data based on the determination result.Type: GrantFiled: February 17, 2009Date of Patent: December 25, 2012Assignee: Ricoh Company, Ltd.Inventors: Masaaki Ishikawa, Hiroshi Shimura
-
Patent number: 8340295Abstract: A cryptographic system (500) that includes a data stream receiving device (502) configured for receiving a modified data stream representing data entries encrypted using a chaotic sequence of digits. The system also includes user processing device (503, 505) configured for receiving user access information specifying an initial value for the chaotic sequence of digits and data field location information associated with selected ones of the data entries. The system further includes a synchronized pair of chaotic sequence generators (300) coupled to the user processing devices configured for generating encryption and decryption sequences based on the initial value and the data field location information. The system additionally includes an encryption device (504) and a decryption device (506) coupled to the chaotic sequence generators and the data stream receiving device, the decrypter configured for generating an output data stream from the modified data stream by applying the decryption sequences.Type: GrantFiled: July 1, 2009Date of Patent: December 25, 2012Assignee: Harris CorporationInventors: Alan J. Michaels, David B. Chester
-
Patent number: 8335014Abstract: A test pattern containing plurality of patches recorded using small dot patterns and large dot patterns is printed. The dot sizes arranged in the patches are different between patches. Then the test patterns are read. The detection rate and average density of additional information embedded in each large dot pattern are obtained. A large dot pattern whose detection rate and average density fall within a reference range and are closest to ideal values is determined. The average density of each small dot pattern is obtained. A small dot pattern whose average density falls within a reference range and is closest to the average density of the determined large dot pattern is determined. A copy-forgery-inhibited pattern image is generated using these dot patterns and combined with a print target image.Type: GrantFiled: May 12, 2009Date of Patent: December 18, 2012Assignee: Canon Kabushiki KaishaInventor: Mizuki Muramatsu
-
Patent number: 8331558Abstract: The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect to one another. The method of performing elliptic curve cryptography is based on the elliptic curve discrete logarithm problem. It is well known that an elliptic curve discrete logarithm problem is a computationally “difficult” or “hard” problem.Type: GrantFiled: February 18, 2010Date of Patent: December 11, 2012Assignee: King Fahd University of Petroleum and MineralsInventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub