Key Sequence Signal Combined With Data Signal Patents (Class 380/43)
  • Patent number: 8548163
    Abstract: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that reduces the overall number of doubling and addition operations thereby providing an efficient method for multiple scalar multiplication. The elements in the pairs for P and Q method are combined into a single pair, and the bits in k and s are evaluated at each step as bit pairs. When the bits in k and s are equal, only one doubling operation and one addition operation are needed to compute the current pair, and when the bits in k and s are not equal, only one doubling operation is needed and two addition operations.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: October 1, 2013
    Assignee: Certicom Corp.
    Inventors: Adrian Antipa, Yuri Poeluev
  • Patent number: 8542825
    Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.
    Type: Grant
    Filed: June 10, 2011
    Date of Patent: September 24, 2013
    Assignee: Adobe Systems Incorporated
    Inventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh
  • Patent number: 8542824
    Abstract: A system and method for processing messages with encryptable message parts. When constructing an encoded message, an encryption key of a plurality of identified encryption keys is used to encrypt message data of a message part. A key identifier is associated with the message part and identifies the encryption key used for the encryption of the message data of the message part. In at least one exemplary embodiment, encryption keys that are used to encrypt message data of message parts are provided in a separate message part, arranged by key identifier. In particular, the encryption keys, arranged by key identifier, may be provided in exactly one message part separate from the message parts containing message data. This allows for a compact message encoding.
    Type: Grant
    Filed: May 4, 2006
    Date of Patent: September 24, 2013
    Assignee: BlackBerry Limited
    Inventors: Michael K. Brown, Michael G. Kirkup, Michael S. Brown
  • Patent number: 8510568
    Abstract: A content import method in a digital rights management (DRM) system imports transport streams received from outside a domain, generates a content file, and regularly inserts information in the form of transport packets necessary for decrypting encrypted content into a payload of the content file. Accordingly, even if usage constraint information (UCI) included in the received content changes, packaging is possible. When a device pertaining to the domain receives half of an imported content file via streaming, transport packets of the received half of the imported content file can be promptly decrypted without a time delay.
    Type: Grant
    Filed: September 7, 2006
    Date of Patent: August 13, 2013
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Bong-seon Kim, Young-sun Yoon
  • Patent number: 8488786
    Abstract: A method of managing the sending of multimedia contents to a mobile terminal (2) equipped with a security module (3), the multimedia contents being sent in encrypted form from a broadcast server (1) and via a communications network (4). The method comprises the following steps: a) sending to the mobile terminal (2) rights-of-use data for a multimedia content, b) storing said rights-of-use data in the security module (3) of the mobile terminal (2), c) generating a series of encryption/decryption keys, the series of decryption keys being generated from rights-of-use data stored in the security module (3), d) sending the multimedia content to the mobile terminal (2), the content being encrypted with successive keys from the series of encryption keys that has been generated, and e) the mobile terminal receiving the multimedia content and decrypting the multimedia content using the decryption keys from the series of decryption keys generated in the security module of the mobile terminal.
    Type: Grant
    Filed: April 6, 2006
    Date of Patent: July 16, 2013
    Assignee: France Telecom
    Inventors: Axel Ferrazzini, Diego Anza, Pascal Chauvaud
  • Patent number: 8467536
    Abstract: A key message can include a key-encryption-key (KEK) associated with a KeyDomainID and a KeyGroupID. A session description message can describe streaming media initialization parameters containing media stream information for one or more media streams. For each media stream, the media stream information can include an IP address and a data port. The session description message can further contain a linkage for binding the KEK to a corresponding one of the media streams. The linkage can include the KeyDomainID and KeyGroupID or can include an abstract representation of the KeyDomainID and KeyGroupID. During session initialization, the key-encryption-key (KEK) can be bound to the media streams using the linkage of the session description message. Each of the media streams can be secured using a traffic key conveyed to user equipment (UE) under protection of the key-encryption-key (KEK).
    Type: Grant
    Filed: December 8, 2010
    Date of Patent: June 18, 2013
    Assignee: Motorola Solutions, Inc.
    Inventors: Adam C. Lewis, Thomas S. Messerges
  • Patent number: 8457310
    Abstract: A print system which are capable of inhibiting simultaneous use of the encrypted print and the box storage to thereby increase the security of print data. A host computer has an encryption function of encrypting print data, and issues a print job for the print data encrypted by the encryption function. A print server receives the issued print job, and has a decryption function of decrypting the encrypted print data of the received print job. A printer has a storage function of storing the print data decrypted by the decryption function, and outputs the stored print data. At least one of the host computer and the print server inhibits simultaneous use of the encryption function and the storage function.
    Type: Grant
    Filed: November 24, 2010
    Date of Patent: June 4, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventors: Hiroshi Uchikawa, Yushi Matsukubo, Fumio Mikami, Yoshinobu Umeda, Tadashi Kawaguchi, Yoshio Kimura, Yasuhiko Hirano, Hitoshi Imai, Hiroyasu Morita
  • Patent number: 8457313
    Abstract: A bit sequence, which is contained in a signalling message and which is known to a network unit and to a communications terminal which receives the signalling message from the network unit, informs the communications terminal that a test value is contained in a signalling message. The test value received by the communications terminal is compared with a test value computed by the communications terminal, and the communications terminal defines a signalling message as being unmodified only in the event that the bit sequence contained in a signalling message has been received and the comparison of both test values yields a positive result.
    Type: Grant
    Filed: March 15, 2005
    Date of Patent: June 4, 2013
    Assignee: Siemens Aktiengesellschaft
    Inventor: Robert Zaus
  • Publication number: 20130114807
    Abstract: An exemplary information sharing method is provided. The information sharing method includes a step of: broadcasting predetermined sharing information to a user terminal(s) within a preset region on a client side in response to a sharing request while an information sharing function is enable. An information sharing module, device and electronic apparatus using the same are also provided.
    Type: Application
    Filed: February 8, 2012
    Publication date: May 9, 2013
    Applicant: National Taiwan University
    Inventors: Liang-Gee CHEN, Tien-Ju YANG, Yi-Min TSAI
  • Patent number: 8437739
    Abstract: A method and apparatus for generating a cryptosync is disclosed that generates a cryptosync with the desired variability without the overhead in complexity and size of prior cryptosyncs. The cryptosync is generated from a combination of fields including fields relating to the segmentation and reassembly of the data packets at a transmitting terminal and a receiving terminal. The resultant cryptosync does not repeat during the use of a particular security key.
    Type: Grant
    Filed: August 18, 2008
    Date of Patent: May 7, 2013
    Assignee: QUALCOMM Incorporated
    Inventors: Ravindra Patwardhan, Fatih Ulupinar, Parag Arun Agashe, Rajat Prakash
  • Patent number: 8433456
    Abstract: A system and method for controlling power windows of a vehicle includes a receiver mounted on the vehicle for receiving an open window request signal wirelessly from a portable device, at least one exterior condition sensor mounted on the vehicle for detecting an adverse exterior condition relative to the vehicle, and a controller mounted on the vehicle for communicating with the receiver and the at least one exterior condition sensor. The controller commands opening of the one or more power windows when the receiver receives the open window request signal provided the at least one exterior condition sensor does not detect an adverse exterior condition relative to the vehicle.
    Type: Grant
    Filed: February 4, 2010
    Date of Patent: April 30, 2013
    Assignee: Honda Motor Co., Ltd.
    Inventors: David G. Peterson, Brian K. Lickfelt, John Sgueglia, Trevor Scott Whitten
  • Patent number: 8428253
    Abstract: A processing method of content intended for broadcasting is disclosed. The method includes, preceding broadcasting: encryption of the content by a plurality of control words, reservation of locations intended to receive a control message in the encrypted content, marking of each location with location information in the content, and storage of a key file comprising the control words. During broadcasting, the method includes: transmission of the encrypted content to a video server, transmission of the key file to a control message generator, broadcasting of the content encrypted by the video server, interception of the video server output by a replacement module, detection, by the replacement module, of location information of control messages in the stream of the broadcasted content, and application of the control messages at locations provided for this purpose by the replacement module.
    Type: Grant
    Filed: April 21, 2005
    Date of Patent: April 23, 2013
    Assignee: Nagravision S.A.
    Inventors: Jean-François Collet, Olivier Brender
  • Patent number: 8406425
    Abstract: An approach is provided for minimizing co-channel interference in a communication system is disclosed. A header of a first frame is scrambled based on a first unique word. A header of a second frame is scrambled based on a second unique word. The first frame including the corresponding scrambled header and the second frame including the corresponding scrambled header are transmitted, respectively, over adjacent co-channels of the communication system. Each of the frames further includes a payload and a pilot block. The payload and the pilot block of the first frame are scrambled based on a first scrambling sequence. The payload and the pilot block of the second frame are scrambled based on a second scrambling sequence. The above arrangement is particularly suited to a digital satellite broadcast and interactive system.
    Type: Grant
    Filed: June 9, 2006
    Date of Patent: March 26, 2013
    Assignee: DTVG Licensing, Inc.
    Inventors: Lin-Nan Lee, Feng-Wen Sun, Adam Von Ancken
  • Patent number: 8385541
    Abstract: The method of performing elliptic polynomial cryptography with elliptic polynomial hopping allows for the encryption of messages through elliptic polynomial cryptography, i.e., using elliptic polynomials with multi x-coordinates, and particularly with the utilization of elliptic polynomial hopping based upon both the elliptic polynomial and its twist, regardless of whether the elliptic polynomial and its twist are isomorphic with respect to one another. Each plaintext block is encrypted by a different elliptic polynomial, and the elliptic polynomials used are selected by an initial secret key and a random number generator. The method is particularly useful for symmetric encryption systems, and provides a block cipher fundamentally based upon a computationally hard problem.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: February 26, 2013
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Patent number: 8370635
    Abstract: A method for synchronization of a digital watermark generates a digital watermark based on feature extraction and a key generator. The synchronization method is adapted for both temporal and spatial synchronization. Statistical features of the watermarked signal along with key generators are used to compute keys used to detect embedded digital watermarks that vary over time or space. For spatial synchronization, spatial redundancy is used to detect geometric distortion of a signal in which the watermark is embedded using an autocorrelation method to detect peaks caused by the redundancy of the watermark structure. These peaks are then analyzed with a histogram method to detect rotation and scaling of the host media signal. The spatial synchronization process is applied to watermarks for both intra-coded frames of video (I-frames) as well as still images.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: February 5, 2013
    Assignee: Purdue Research Foundation
    Inventors: Edward J. Delp, Eugene T. Lin
  • Patent number: 8351601
    Abstract: Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of secret keys in the message bit string. The method of performing elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: January 8, 2013
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Patent number: 8340295
    Abstract: A cryptographic system (500) that includes a data stream receiving device (502) configured for receiving a modified data stream representing data entries encrypted using a chaotic sequence of digits. The system also includes user processing device (503, 505) configured for receiving user access information specifying an initial value for the chaotic sequence of digits and data field location information associated with selected ones of the data entries. The system further includes a synchronized pair of chaotic sequence generators (300) coupled to the user processing devices configured for generating encryption and decryption sequences based on the initial value and the data field location information. The system additionally includes an encryption device (504) and a decryption device (506) coupled to the chaotic sequence generators and the data stream receiving device, the decrypter configured for generating an output data stream from the modified data stream by applying the decryption sequences.
    Type: Grant
    Filed: July 1, 2009
    Date of Patent: December 25, 2012
    Assignee: Harris Corporation
    Inventors: Alan J. Michaels, David B. Chester
  • Patent number: 8339678
    Abstract: An apparatus, system, and method for image processing are disclosed, each of which obtains a mark from image data, detects additional information in the mark, determines whether the mark is detected in the mark to generate a determination result, and controls processing performed by an image processing apparatus with respect to the image data based on the determination result.
    Type: Grant
    Filed: February 17, 2009
    Date of Patent: December 25, 2012
    Assignee: Ricoh Company, Ltd.
    Inventors: Masaaki Ishikawa, Hiroshi Shimura
  • Patent number: 8335014
    Abstract: A test pattern containing plurality of patches recorded using small dot patterns and large dot patterns is printed. The dot sizes arranged in the patches are different between patches. Then the test patterns are read. The detection rate and average density of additional information embedded in each large dot pattern are obtained. A large dot pattern whose detection rate and average density fall within a reference range and are closest to ideal values is determined. The average density of each small dot pattern is obtained. A small dot pattern whose average density falls within a reference range and is closest to the average density of the determined large dot pattern is determined. A copy-forgery-inhibited pattern image is generated using these dot patterns and combined with a print target image.
    Type: Grant
    Filed: May 12, 2009
    Date of Patent: December 18, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Mizuki Muramatsu
  • Patent number: 8331558
    Abstract: The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect to one another. The method of performing elliptic curve cryptography is based on the elliptic curve discrete logarithm problem. It is well known that an elliptic curve discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: December 11, 2012
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Patent number: 8320561
    Abstract: Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.
    Type: Grant
    Filed: August 5, 2008
    Date of Patent: November 27, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Peter Anthony Barany, Arnaud Meylan, Sai Yiu Duncan Ho, Francesco Grilli, Nathan Edward Tenny, Rashid Ahmed Akbar Attar
  • Patent number: 8315382
    Abstract: A method for monitoring execution of a sequence of data processing program instructions in a security module associated to a multimedia unit connected to a managing center supplying control messages authorizing access to broadcast data streams. The security module comprises a processor for executing the instructions, a memory, and a monitoring module for analyzing the instructions before execution by the processor. The managing center comprises a security module emulator generating reference data sets by executing a sequence of instructions induced by data of a given control message in the program. The reference data sets are appended to control messages sent to the security module. The monitoring module analyzes a sequence of program instructions for determining a check data set which is compared with a reference data set received from the control messages. When the reference and check data sets match, the program continues executing. Otherwise, further control message processing stops.
    Type: Grant
    Filed: June 8, 2010
    Date of Patent: November 20, 2012
    Assignee: Nagravision S.A.
    Inventor: Jean-Bernard Fischer
  • Patent number: 8307210
    Abstract: A method for validating a cryptographic token includes (a) operating the cryptographic token to generate a pseudo-random number for authentication purposes by using a cryptographic seed uniquely associated with the cryptographic token, the cryptographic seed having been cryptographically generated using a precursor value, (b) receiving a first value from the cryptographic token, the first value being the pseudo-random number generated by the cryptographic token, (c) inputting the first value and the precursor value into a trusted computing platform, and (d) operating the trusted computing platform to generate a validation signal if the first value can be derived using a specified algorithm from the precursor value, but to generate a failure signal if the first value cannot be derived using the specified algorithm from the precursor value. Accompanying methods and apparatus are also provided.
    Type: Grant
    Filed: May 2, 2008
    Date of Patent: November 6, 2012
    Assignee: EMC Corporation
    Inventor: William M. Duane
  • Patent number: 8300813
    Abstract: Secure communication of information is effected from a first party to a second party when the first party knows its own global location and the global location of the second party, and employs what essentially is an undiscoverable code signal that is broadcast to, and received by, both the first and the second parties. The first party securely communicates information to the second party by modifying the code signal with the information that is to be communicated and sends the modified code signal to the second party. Illustratively, the code signal is related to the Y component of a GPS signal.
    Type: Grant
    Filed: August 29, 2008
    Date of Patent: October 30, 2012
    Assignee: The Boeing Company
    Inventors: David S DeLorenzo, Per K Enge, Sherman C. Lo
  • Patent number: 8284930
    Abstract: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that reduces the overall number of doubling and addition operations thereby providing an efficient method for multiple scalar multiplication. The elements in the pairs for P and Q method are combined into a single pair, and the bits in k and s are evaluated at each step as bit pairs. When the bits in k and s are equal, only one doubling operation and one addition operation are needed to compute the current pair, and when the bits in k and s are not equal, only one doubling operation is needed and two addition operations.
    Type: Grant
    Filed: July 6, 2011
    Date of Patent: October 9, 2012
    Assignee: Certicom Corp.
    Inventors: Adrian Antipa, Yuri Poeluev
  • Patent number: 8284932
    Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.
    Type: Grant
    Filed: November 23, 2011
    Date of Patent: October 9, 2012
    Assignee: Adobe Systems Incorporated
    Inventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh
  • Patent number: 8280045
    Abstract: A text-input device and method is provided. The device includes a display unit that displays a user interface, which is divided into a plurality of areas each including a plurality of cells where predetermined text is displayed, an input unit that includes a plurality of text-input units to provide a focusing signal that focuses on a predetermined cell in the displayed user interface and a selecting signal that selects the focused cell, a user interface providing unit that generates a control signal corresponding to the selected cell with reference to a mapping table according to whether the selecting signal is available, and a control unit that performs a control command based on the control signal, wherein the plurality of text-input units correspond to the areas.
    Type: Grant
    Filed: November 9, 2006
    Date of Patent: October 2, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Sang-jin Lee, Kyun-hoe Park, Kyoung-won Kim, Woon-geun Kwak, Dae-sun Rhee
  • Patent number: 8275997
    Abstract: A method of encrypting and transmitting data and a system for transmitting encrypted data. The method includes one or more different encryption algorithms, and may include employing different encryption algorithms to achieve multiple levels of encryption. A first encryption algorithm is based upon multiple rearrangements of bits representing data to obtain encoded data. A second encryption algorithm is based upon performing multiple XOR operations on bits representing data so that each data word is at least encoded with previous data words. The system comprises first and second computers and a plurality of communication parameters. The two computers are communicably connected to a network, and the second computer is adapted to route a transmission to the first computer. The transmission includes a data part and a header part, both of which are encrypted by the second computer utilizing the communication parameters. The first computer decrypts the transmission utilizing the communication parameters.
    Type: Grant
    Filed: July 1, 2010
    Date of Patent: September 25, 2012
    Assignee: Encryption Solutions, Inc.
    Inventors: Robert Allen Stedron, John L. Chmielewski
  • Patent number: 8265269
    Abstract: The present invention provides a receiving apparatus including a device key generating unit which generates a device key, a work key generating unit which generates a work key, a device key storing unit which sequentially stores the generated device key, every time the device key is updated, and a recording unit which stores a digital broadcast signal in a transport stream format, wherein in a case where the device key generating unit cannot generate, from the stored transport stream, a device key necessary for descrambling the stored transport stream when the stored transport stream is to be reproduced, the work key generating unit decrypts an encrypted work key that is obtained from the stored transport stream, using the device key stored in the device key storing unit, and generates a work key.
    Type: Grant
    Filed: October 9, 2009
    Date of Patent: September 11, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventors: Ryuji Nishida, Yoshihiro Saga, Kenichi Morikawa, Kazuhiko Nakazawa
  • Patent number: 8261055
    Abstract: A first information processing apparatus encrypts data that it receives from a second information processing apparatus, and transmits the data thus encrypted to an external device. The second information processing apparatus transmits the data to the first information processing apparatus according to a data size that results after a data size being necessary for communication of the encrypted data is subtracted from a specified data size.
    Type: Grant
    Filed: June 27, 2007
    Date of Patent: September 4, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Masahiko Sakai
  • Patent number: 8249251
    Abstract: A device for generating a seedless pseudo-random number, according to one embodiment, includes a first register containing a secret code; a second register containing a first random number generated locally and a second random number generated at a remote device; and an exclusive OR (XOR) circuit receiving output from the first and second registers and applying an XOR function to the outputs, a result of the XOR function being fed into the second register in a subsequent cycle.
    Type: Grant
    Filed: September 14, 2010
    Date of Patent: August 21, 2012
    Inventors: Roger Green Stewart, Daniel Noah Paley
  • Patent number: 8243926
    Abstract: An encryption device, comprising: detection portion for detecting a TS header, a PES header, a sequence header, a GOP header, and a sequence end code for a transport stream not encrypted; and encryption portion for encrypting the transport stream except the TS header, the PES header, the sequence header, the GOP header, and the sequence end code. An editing device, comprising: detection portion for detecting a TS header, a PES header, a sequence header, a GOP header, and a sequence end code in a transport stream; and editing portion for editing the encrypted transport stream without decryption in units of TS packets ranging from a TS packet where the GOP header is detected to a TS packet previous to a TS packet where a subsequent GOP header is detected out of TS packets having an identical PID.
    Type: Grant
    Filed: September 30, 2004
    Date of Patent: August 14, 2012
    Assignee: NEC Personal Computers, Ltd.
    Inventor: Yuichi Sakai
  • Patent number: 8234217
    Abstract: A method of operating a digital program playback device, including: receiving, via a first communications network, a data stream including an encrypted data portion representative of a program; identifying, from the received data stream, an identifier associated with the program; transmitting the program identifier and a device identifier associated with the digital program playback device to an authorization device via a second communications network; receiving, via the second communications network, a decryption key in response to the transmission; and, decrypting the data stream using the decryption key and generating an output signal for playback of the program.
    Type: Grant
    Filed: March 17, 2005
    Date of Patent: July 31, 2012
    Assignee: Thomson Licensing
    Inventor: Mike Arthur Derrenberger
  • Patent number: 8233616
    Abstract: An encryption processing unit executes an arithmetic operation decided in advance and outputs an arithmetic result as an element on an algebraic torus. A compressing unit outputs, when the arithmetic result is an exceptional point representing an element on the algebraic torus that cannot be compressed by a compression map for compressing an element on the algebraic torus into affine representation, a compression result obtained by compressing the arithmetic result according to the compression map and outputs, when the arithmetic result is the exceptional point, an element belonging to a specific set decided in advance that does not overlap a set to which a compression result obtained by compressing the arithmetic result, which is not the exceptional point, belongs.
    Type: Grant
    Filed: March 18, 2009
    Date of Patent: July 31, 2012
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Hirofumi Muratani, Tomoko Yonemura, Atsushi Shimbo, Kenji Ohkuma, Taichi Isogai, Yuichi Komano, Kenichiro Furuta, Yoshikazu Hanatani, Hanae Ikeda
  • Patent number: 8218768
    Abstract: A cryptosync design comprising (1) a channel identifier indicative of a particular channel via which a data packet is sent, (2) an extended time stamp indicative of a time value associated with the data packet, and (3) a counter indicative of a packet count associated with the data packet. The lengths of the extended time stamp and counter fields and the time unit for the extended time stamp are parameters that may be configured for each channel. At the sender, the extended time stamp for the cryptosync may be obtained from the System Time maintained by the sender. The counter value for the cryptosync may be provided by a counter that is maintained for the channel by the sender. The sender may include a time stamp and/or the counter value, if they are needed to derive the cryptosync at the receiver, in a header of the data packet.
    Type: Grant
    Filed: March 25, 2002
    Date of Patent: July 10, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Ramin Rezaiifar, Paul E. Bender, Roy Franklin Quick, Jr.
  • Patent number: 8213050
    Abstract: An image processing device, which includes: an original reception unit that receives an original image; a dot image generation unit that generates, on the basis of additive information to be added to the original image, a dot image in which a plurality of dots each formed by one or more pixels are arranged; a state alteration unit that, when any of the dots in the dot image is determined to be not extractable, alters a state of the non-extractable dot on the basis of a relationship between a position on the dot image generated by the dot image generation unit and a corresponding position on the original image; and a composite image generation unit that generates a composite image by superimposing, on the original image, the dot image having the state of the non-extractable dot altered by the state alteration unit.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: July 3, 2012
    Assignee: Fuji Xerox Co., Ltd.
    Inventor: Yasuhiko Iwamoto
  • Patent number: 8213616
    Abstract: Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device when an eavesdropper device is listening on an eavesdropper channel. This example method includes transmitting, in a first time period in which signal quality on the main channel is better than signal quality on the eavesdropper channel, symbols that are randomly selected from a set of symbols. The method also includes transmitting, in a second time period in which signal quality on the main channel is not better than signal quality on the eavesdropper channel, coding information associated with the randomly selected symbols. The method also includes reconciling the randomly selected symbols using the coding information.
    Type: Grant
    Filed: September 18, 2007
    Date of Patent: July 3, 2012
    Assignees: Georgia Tech Research Corporation, Cambridge Enterprise Limited, Universidade Do Porto
    Inventors: Matthieu Ratislav Bloch, Miguel Raul Dias Rodrigues, Joao Francisco Cordeiro de Oliveira Barros, Steven William McLaughlin
  • Patent number: 8189787
    Abstract: A data communication apparatus is highly concealable and significantly increases time necessary for an eavesdropper to analyze cipher text. A multi-level code generation section generates, by using predetermined key information, a multi-level code sequence in which a signal level changes so as to be random numbers. The multi-level processing section combines a multi-level code sequence and information data, and generates a multi-level signal having a level corresponding to a combination of the multi-level code sequence and the information data. In the multi-level code generation section, a random number sequence generation section generates a binary random number sequence by using the predetermined key information. A multi-level conversion section generates a multi-level code sequence from the binary random number sequence in accordance with a predetermined encoding rule.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: May 29, 2012
    Assignee: Panasonic Corporation
    Inventors: Tomokazu Sada, Masaru Fuse, Satoshi Furusawa, Tsuyoshi Ikushima
  • Patent number: 8180048
    Abstract: The invention generally relates to computational transformation process, which has applications in cryptography, random number generation, hash code generation etc. The computational transformation module uses a keyset, which is designed using a two dimensional array. Since the process of forward transformation used in the invention is a symmetric encryption process and if used to send data securely over a communications network, the same keyset needs to be present at the sending computer to encrypt the data and the receiving computer to go through a reverse transformation and decrypt the data. When the first ‘n’ bit block of input-data is transformed into the first ‘m’ bit block of output-data, the keyset is transformed into a different keyset based on a nonlinear or one-way transformation on the keyset. The next input block is encrypted using a transformed keyset, hence satisfying Shanons theory of perfect secrecy.
    Type: Grant
    Filed: September 14, 2004
    Date of Patent: May 15, 2012
    Inventor: Prahlad P Singanamala
  • Patent number: 8165296
    Abstract: Embodiments of the invention provide for encryption and decryption of data in a TDMA network using TDMA time values. In some embodiments, TDMA time values can be transmitted to terminals from a network controller using a burst time plan. These TDMA time values along with other data and/or counters can be combined to create a one-time key, which can be used to both encrypt data and/or decrypt data. Embodiments of the invention can decrease communication overhead by using the TDMA time value for TDMA purposes as well as for encryption purposes.
    Type: Grant
    Filed: May 27, 2009
    Date of Patent: April 24, 2012
    Assignee: ViaSat, Inc.
    Inventor: Edward Smith
  • Patent number: 8160253
    Abstract: A method for wireless data transmission between a base station and a transponder is provided, whereby a message, comprising at least one command and one data sequence, is transmitted by the base station, the message is received and evaluated by the transponder, at least one key is provided in the transponder after receipt of the command and before complete receipt of the message and the key is transmitted to the base station, the key is detected by the base station, and parts of the message, still to be transmitted, and/or subsequent messages are encoded by the base station with the key.
    Type: Grant
    Filed: June 25, 2007
    Date of Patent: April 17, 2012
    Assignee: Atmel Corporation
    Inventors: Martin Fischer, Ulrich Friedrich, Jens Masuch, Michael Pangels, Dirk Ziebertz
  • Patent number: 8144872
    Abstract: A system and method for generating analog-digital mixed chaotic signal and an encryption communication method thereof are provided. In the system and method, the complementarity between continuous chaotic systems (12, 22) and digital chaotic systems (11, 21) are reasonably utilized. In specific, the digital chaotic systems, which are separated from each other, control the local continuous chaotic systems respectively, so as to enable the continuous chaotic systems, which are also separated from each other, to stably and synchronously work for a long time. Thus, there is no need to transmit the synchronizing signal, and as a result the anti-attack capability is increased effectively. Further, the continuous chaotic systems disturb the local digital chaotic systems to prevent the digital chaotic systems from degradation. This compensates the drawbacks of digital chaotic systems.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: March 27, 2012
    Assignees: Huawei Technologies Co., Ltd., Huazhong University of Science & Technology
    Inventors: Hanping Hu, Zuxi Wang, Xiaogang Wu, Lin Zhou, Ziqi Zhu, Jiwei Wei, Jie Yang, Pengyu Lu, Zhibin Zheng
  • Patent number: 8144368
    Abstract: This disclosure describes methods for using embedded auxiliary signals in documents for copy detection and other applications. In on application, the auxiliary signal is formed as an array of elements selected from a set of print structures with properties that change differently in response to copy operations. These changes in properties of the print structures that carry the embedded auxiliary signal are automatically detectable. For example, the changes make the embedded auxiliary signal more or less detectable. The extent to which the auxiliary data is detected forms a detection metric used in combination with one or more other metrics to differentiate copies from originals. Examples of sets of properties of the print structures that change differently in response to copy operations include sets of colors (including different types of inks), sets of screens or dot structures that have varying dot gain, sets of structures with different aliasing effects, etc.
    Type: Grant
    Filed: November 26, 2003
    Date of Patent: March 27, 2012
    Assignee: Digimarc Coporation
    Inventors: Tony F. Rodriguez, Alastair M. Reed, Ravi K. Sharma, Osama M. Alattar, Brett T. Hannigan, Kenneth L. Levy, Hugh L. Brunk, Geoffrey B. Rhoads, Ammon E. Gustafson
  • Patent number: 8135130
    Abstract: The data encryption apparatus with a data converting unit splits 256-bit input data into 32-bit data blocks A1, B1, A2, and B2. A first combining unit performs an exclusive OR operation on A1 and B1, and on A2 and B2. A first scramble unit branches A1, A2, and the results of the exclusive OR operations (C1 and C2) into three data blocks each, and for each set of three data blocks, shift-rotates two of the data blocks and combines the shifted data blocks with the remaining data block. A second combining unit performs an exclusive OR operation on D1 and E2, and on D2 and E1, which are the results of the processing performed by the first scramble unit. A block concatenating unit concatenates the results of the operations performed by the second combining unit. A second scramble unit branches the concatenated data into three data blocks, shift-rotates two of the data blocks and combines the two shifted data blocks with the remaining data block.
    Type: Grant
    Filed: June 19, 2007
    Date of Patent: March 13, 2012
    Assignee: Panasonic Corporation
    Inventors: Masao Nonaka, Kaoru Yokota, Motoji Ohmori
  • Patent number: 8127138
    Abstract: The invention as disclosed is of a method to authenticate identify and trace sonar transmissions and echoes by embedding transparent, secure and robust digital watermarks in signal space, where the additional information incurs no cost in bandwidth. The complex short time Fourier transform is selected as the domain for embedding the digital watermark, secured by a secret key, in the time frequency representation of the signal. The watermark is designed through an iterative optimization step. This step insures that the watermarked sonar is also realizable. Selection of the time frequency region for watermarking is driven by avoidance of interference with the sonar itself, or in case of network operation, other watermarks. In addition, the selected time-frequency region remains robust to sound channel and other transmission effects. Sonar echoes are authenticated in the time-frequency plane by a correlation receiver tuned to the watermarked region using the secret key.
    Type: Grant
    Filed: September 29, 2008
    Date of Patent: February 28, 2012
    Assignee: The United States of America as represented by the Secretary of the Navy
    Inventors: Robert S. Lynch, G. Clifford Carter, Bijan Mobasseri
  • Patent number: 8125691
    Abstract: A watermark information embedding apparatus generates a document image from electronic document data that has been input thereto, modifies the electronic document data based upon the document image and embeds information in the electronic document data. The apparatus includes a document image generator for generating a document image from the electronic document data; a document analyzer for detecting layout information of each constituent image in the generated document image; a normalization information calculation unit for calculating normalization information, which is for normalizing placement of each constituent image, based upon the detected layout information; a modification unit for modifying the electronic document data; and an embedding unit for embedding information in the modified electronic document data.
    Type: Grant
    Filed: October 1, 2008
    Date of Patent: February 28, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kenichi Okihara
  • Patent number: 8111828
    Abstract: A management system generates a sequence of keys and an identifier of each key in the sequence. A current key in the sequence and the identifier of the current key are transferred from the management system to a storage system. The storage system encrypts the data into encrypted data using the current key. The storage system stores the identifier and the encrypted data. The identifier and the encrypted data are retrieved from the storage system. The key in the sequence identified by the identifier is transferred from the management system to the storage system. The storage system decrypts the encrypted data using the decryption key.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: February 7, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Shankar Raman, Kiran Kumar Malle Gowda
  • Patent number: 8107621
    Abstract: Mechanisms for providing an encrypted file system are provided. The mechanisms use a combination of encryption methodologies so as to reduce the amount of decryption and re-encryption that is necessary to a file in the Encrypted File System in the event that the file needs to be modified. The encryption methodologies are interleaved, or alternated, with regard to each block of plaintext. In one illustrative embodiment, Plaintext Block Chaining (PBC) and Cipher Block Chaining (CBC) encryption methodologies are alternated for encrypting a sequence of blocks of data. The encryption of a block of plaintext is dependent upon the plaintext or a cipher generated for the plaintext of a previous block of data in the sequence of blocks of data so that the encryption is more secure than known Electronic Code Book encryption methodologies.
    Type: Grant
    Filed: August 20, 2008
    Date of Patent: January 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ufuk Celikkan, William C. Conklin, Shawn P. Mullen, Ravi A. Shankar
  • Patent number: 8089661
    Abstract: In a computer system in which information represented by digital data is output to plural pages of recording medium, and then information on the plural pages of recording medium is read to use digital data representing the read information, authentication information is embedded in information of a start page selected by the computer system; a page number of the start page embedded the authentication information is notified to a user; information on the plural pages of recording medium is read, wherein the start page is positioned so as to be read first; digital data read from the plural pages of recording medium is authenticated based on the authentication information embedded in the start page; and a process for the digital data read from the plural pages of recording medium is controlled in accordance with a result of the authentication.
    Type: Grant
    Filed: June 19, 2008
    Date of Patent: January 3, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Ryuta Mori
  • Patent number: 8055903
    Abstract: A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as “watermarking.” The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues.
    Type: Grant
    Filed: February 15, 2007
    Date of Patent: November 8, 2011
    Assignee: Avaya Inc.
    Inventors: Akshay Adhikari, Sachin Garg, Anjur Sundaresan Krishnakumar, Navjot Singh