Key Sequence Signal Combined With Data Signal Patents (Class 380/43)
  • Patent number: 8045707
    Abstract: Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for example, encrypted data. The processor may be coupled to the memory and may include, for example, a decryptor that decrypts the encrypted data. The decryptor may be adapted, for example, to variably bit roll the encrypted data, to fixedly bit shuffle the bit-rolled data, to add a first key to the bit-shuffled data and to process the added data with a second key.
    Type: Grant
    Filed: October 28, 2003
    Date of Patent: October 25, 2011
    Assignee: Broadcom Corporation
    Inventors: Steve W. Rodgers, Sherman (Xuemin) Chen, Iue-Shuenn Chen
  • Patent number: 8045705
    Abstract: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that reduces the overall number of doubling and addition operations thereby providing an efficient method for multiple scalar multiplication. The elements in the pairs for P and Q method are combined into a single pair, and the bits in k and s are evaluated at each step as bit pairs. When the bits in k and s are equal, only one doubling operation and one addition operation are needed to compute the current pair, and when the bits in k and s are not equal, only one doubling operation is needed and two addition operations.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: October 25, 2011
    Assignee: Certicom Corp.
    Inventors: Adrian Antipa, Yuri Poeluev
  • Patent number: 8023159
    Abstract: The present invention provides methods and apparatus for embedding an identifying pattern of visible speckles into the digitized image of each page of a document. A speckle is a cluster of black or white pixels. Speckles are printed as black speckles on the white paper, or conversely, as areas of missing black removed from the black text characters, called white speckles. The collective pattern of all embedded black and white speckles on a single document page is called a specklemark. A specklemark can survive contrast manipulations on photocopiers and binary rasterization done by fax scanning prior to data transmission. The random pattern of the black and white speckles visible in the digitized image of a document page can be detected automatically, and by systematically matching the detected pattern with those known to have been embedded into marked copies of a document page, a specific document copy can be identified.
    Type: Grant
    Filed: July 9, 2008
    Date of Patent: September 20, 2011
    Assignee: International Business Machines Corporation
    Inventors: Gordon W. Braudaway, Frederick C. Mintzer
  • Publication number: 20110200188
    Abstract: The method of performing cipher block chaining using elliptic polynomial cryptography allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the utilization of cipher block chaining based upon both the elliptic polynomial and its twist, regardless of whether the elliptic polynomial and its twist are isomorphic with respect to one another. The method of performing cipher block chaining is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Application
    Filed: February 18, 2010
    Publication date: August 18, 2011
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Publication number: 20110200187
    Abstract: Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of secret keys in the message bit string. The method of performing elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Application
    Filed: February 18, 2010
    Publication date: August 18, 2011
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Publication number: 20110200186
    Abstract: The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect to one another. The method of performing elliptic curve cryptography is based on the elliptic curve discrete logarithm problem. It is well known that an elliptic curve discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Application
    Filed: February 18, 2010
    Publication date: August 18, 2011
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Publication number: 20110182424
    Abstract: A method begins by a processing module receiving data segments of a data stream to produce received data segments. The method continues with the processing module encrypting a data segment of the received data segments to produce an encrypted data segment and dispersed storage error encoding the encrypted data segment to produce a set of encoded data slices in order of receiving the data segments. The method continues with the processing module buffering encoded data slices of sets of the encoded data slices unit to produce buffered encoded data slices and comparing a number of buffered encoded data slices to a threshold. The method continues with the processing module outputting the encoded data slices of the buffered encoded data slices based on a pseudo-random sequencing order when the number of buffered encoded data slices compares favorably to the threshold.
    Type: Application
    Filed: November 28, 2010
    Publication date: July 28, 2011
    Applicant: CLEVERSAFE, INC.
    Inventors: Gary W. Grube, Timothy W. Markison
  • Patent number: 7970140
    Abstract: A transmitting node produces synchronization data to be inserted into plain text and encrypts the thus generated data into multi-valued data so as to transmit the data. The synchronization data indicates the position of a running key used for encryption. A receiving node decrypts a signal including the synchronization data using the running key and detects the synchronization data from the signal to confirm synchronization of the running key between transmitting and receiving nodes. Then, the receiving node transmits a synchronization confirmation signal to the transmitting node. If the transmitting node does not receive the synchronization confirmation signal, it determines that synchronization of the running key is shifted, and re-synchronization is performed. To perform re-synchronization, a running key ahead of the position of the running key associated with synchronization data that has been stored is generated.
    Type: Grant
    Filed: April 26, 2007
    Date of Patent: June 28, 2011
    Assignee: Hitachi Information & Communication Engineering, Ltd.
    Inventors: Takeshi Hosoi, Katsuyoshi Harasawa, Makoto Honda, Shigeto Akutsu
  • Patent number: 7961878
    Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.
    Type: Grant
    Filed: October 15, 2007
    Date of Patent: June 14, 2011
    Assignee: Adobe Systems Incorporated
    Inventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh
  • Patent number: 7925890
    Abstract: A method is provided for re-initializing a cryptographic processing module (102) at a location designated as an unclassified environment. The method includes storing in a database (122) a module unique recovery vector (310, 510) assigned to a cryptographic processing module. The method also includes indexing the module unique recovery vector in the database using a unique module identifying code (for example, a serial number) assigned to the cryptographic processing module. The method further includes subsequently communicating the module unique recovery vector from the database, over a computer network (120), to a remote computing environment (400) that is unclassified. The module unique recovery vector is used to re-initialize the cryptographic processing module.
    Type: Grant
    Filed: October 23, 2006
    Date of Patent: April 12, 2011
    Assignee: Harris Corporation
    Inventors: Donald J. Dever, Ian D. Mann
  • Patent number: 7926100
    Abstract: A method for preventing unauthorized connection in a network system mainly includes adding an authentication key in the LLDP (link layer discovery protocol) transmitted in accordance with the 802.1ab communication protocol so as to proceed with security mechanism under the structure of 802.1ab communication protocol. The method for preventing unauthorized connection includes receiving a LLDP packet satisfying the 802.1ab communication protocol transmitted from a second network device by a first network device in a network system; analyzing the LLDP packet and checking whether the LLDP packet contains a legitimate authentication key; and if the authentication key does not exist or is illegitimate, then block all packets transmitted from the second network device so as to prevent the unauthorized second network device from using the network transmission service provided by the first network device.
    Type: Grant
    Filed: May 11, 2007
    Date of Patent: April 12, 2011
    Assignee: Cameo Communications Inc.
    Inventors: Shih Ching Lee, Pei Chuan Liu
  • Patent number: 7920705
    Abstract: A communication system comprises a covert channel detector. The covert channel detector can be used in a multi-level security system (MLS) or multiple single levels of security (MSLS). The covert channel detector detects covert channels in a cryptographic system. The cryptographic system can be used in a military radio system.
    Type: Grant
    Filed: July 26, 2006
    Date of Patent: April 5, 2011
    Assignee: Rockwell Collins, Inc.
    Inventor: Reginald D. Bean
  • Publication number: 20110075682
    Abstract: Embodiments of the invention are generally directed to messaging to provide data link integrity. An embodiment of a method includes transmitting a data stream over a data link from a first device to a second device, the data stream including multiple frames, the data stream being transmitted in a first mode. The method further includes determining a data transmission mode change from the first mode to a second mode for the transmission of the data stream from the first device to the second device, generating mode packets, each mode packet including fields to define a plurality of mode elements, the fields of the mode packet being set to indicate the data transmission mode change, and transmitting the mode packets to the second device prior to implementing the data transmission mode change.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Inventor: William Conrad Altmann
  • Patent number: 7913089
    Abstract: An ID creating apparatus includes a derivative value creating unit for creating a derivative value, a user ID encrypting unit for creating encrypted ID by encrypting information including the user ID and the derivative value based on an encryption key, and a derivative ID creating unit for creating derivative ID based on the encrypted ID. An ID resolving apparatus includes an encrypted ID extracting unit for extracting the encrypted ID included in the derivative ID, an encrypted ID decrypting unit for decrypting the encrypted ID based on a decryption key corresponding to the encryption key and thereby creating decrypted ID, and an ID judging unit for determining that the derivative ID is created from the user ID when part of the decrypted ID coincides with information created based on the user ID.
    Type: Grant
    Filed: December 17, 2003
    Date of Patent: March 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Yuji Watanabe, Yoshinori Aoki, Masayuki Numao
  • Patent number: 7912215
    Abstract: A data transmitting apparatus generates, by using predetermined first key information and information data, a multi-level signal in which a signal level changes so as to be approximately random numbers, and converts the multi-level signal into a modulated signal, in a predetermined modulation method and transfer the same. A data receiving apparatus demodulates the modulated signal so as to be converted into a multi-level signal, and reproduces information data from the multi-level signal, using second key information which has the same content as first key information used by the data transmitting apparatus.
    Type: Grant
    Filed: January 22, 2007
    Date of Patent: March 22, 2011
    Assignee: Panasonic Corporation
    Inventors: Satoshi Furusawa, Masaru Fuse, Tsuyoshi Ikushima, Tomokazu Sada
  • Patent number: 7903813
    Abstract: A system for encrypting and decrypting data formed of a number of bytes using the ARCFOUR encryption algorithm is disclosed. The system includes a system bus and an encryption accelerator arranged to execute the encryption algorithm coupled to the system bus. A system memory coupled to the system bus arranged to store a secret key array associated with the data and a central processing unit coupled to the system bus wherein encryption accelerator uses substantially no central processing unit resources to execute the encryption algorithm.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: March 8, 2011
    Assignee: Broadcom Corporation
    Inventor: Donald E. Duval
  • Patent number: 7889861
    Abstract: A method for reducing the memory requirements of executing ciphering processes is disclosed which utilizes sequential key extraction and ciphering. By providing a base key for extracting therefrom multiple first sequential security keys; each key is sequentially extracted and employed. During the process overwriting of each sequential security key occurs with the next subsequently extracted sequential security key. In this manner memory requirements are lowered, power consumption reduced which are important in mobile applications.
    Type: Grant
    Filed: September 13, 2007
    Date of Patent: February 15, 2011
    Inventor: Michael Borza
  • Patent number: 7886151
    Abstract: A protocol for temporal synchronization of media signals with temporal components is used for digital watermarking and other applications. The synchronization protocol achieves initial synchronization by finding an initial synchronization key through analysis of a temporal media signal stream. It then uses features of the stream and a queue of one or more keys from previous frames to derive subsequent keys to maintain synchronization. If synchronization is lost due to channel errors or attacks, for example, the protocol uses the initial synchronization key to re-establish synchronization. In digital watermarking applications, the synchronization protocol is agnostic to the watermark embedding and reading functions.
    Type: Grant
    Filed: January 21, 2003
    Date of Patent: February 8, 2011
    Assignee: Purdue Research Foundation
    Inventors: Edward J. Delp, Eugene T. Lin
  • Patent number: 7882208
    Abstract: An information management apparatus includes a management unit for managing the type of integrated circuit chip and the type of command to be executed by the integrated circuit chip in such a manner as to correspond to each other; an information obtaining unit for obtaining information on the type of the integrated circuit chip to be controlled; and a command generation unit for generating a command of the type corresponding to the type of the integrated circuit chip to be controlled, the type of the integrated circuit chip being obtained by the information obtaining unit, from among a plurality of different types of commands corresponding to the command requested from a server and for transmitting the generated command to the server.
    Type: Grant
    Filed: September 22, 2005
    Date of Patent: February 1, 2011
    Assignee: Felica Networks, Inc.
    Inventors: Hideki Akashika, Jun Ogishima, Naofumi Hanaki
  • Patent number: 7876894
    Abstract: In one embodiment, method that can be performed on a system, is provided to security implementations for storage devices. In one embodiment, the method comprises providing a separate encryption seed for each of a plurality of separate addressable blocks of a non-volatile storage device, wherein a common encryption method is to encrypt data to be stored on the plurality of separate addressable blocks. In one embodiment, the storage device is a portable storage device. In one embodiment, encryption seed is an Initialization Vector (IV). In one embodiment, the encryption seeds comprise at least one of a media serial number and a logical block address corresponding to the respective block of the non-volatile storage device. In an alternative embodiment, the method further comprises storing at least a part of the separate encryption seed of the separate blocks of the non-volatile storage device within the respective blocks of the storage device.
    Type: Grant
    Filed: November 14, 2006
    Date of Patent: January 25, 2011
    Assignee: MCM Portfolio LLC
    Inventors: Sree Mambakkam Iyer, Larry Lawson Jones, Arockiyaswamy Venkidu, Santosh Kumar
  • Patent number: 7868788
    Abstract: Described herein is an efficient encryption method and system having improved security features based on randomness. The method and system utilize a random dictionary insertion and a random dictionary permutation, and a key stream generated by a stream cipher. Security analysis results show that the method and system provides a higher level of security without incurring any coding efficiency loss, compared with a existing encoding methods.
    Type: Grant
    Filed: June 17, 2009
    Date of Patent: January 11, 2011
    Assignee: The Hong Kong University of Science and Technology
    Inventors: Oscar Chi Lim Au, Jiantao Zhou
  • Patent number: 7860251
    Abstract: An encryption-decryption circuit for encrypting and decrypting data. The encryption-decryption circuit comprises: 1) an N-bit shift register for storing and shifting an N bit keyword; 2) a first exclusive-OR gate array for receiving M bits from the N-bit shift register and generating a one-bit exclusive-OR result that is shifted into an input of the N-bit shift register; and 3) a second exclusive-OR gate array comprising K exclusive-OR gates, each of the K exclusive-OR gates receiving one of K bits from the N-bit shift register and one of K data bits from a received K-bit data word and generating therefrom an exclusive-OR result. The K exclusive-OR gates thereby produce one of: i) a K-bit encrypted data word and ii) a K-bit unencrypted data word.
    Type: Grant
    Filed: March 26, 2002
    Date of Patent: December 28, 2010
    Assignee: National Semiconductor Corporation
    Inventor: Richard F. Zarr
  • Publication number: 20100310068
    Abstract: A method for monitoring execution of a sequence of data processing program instructions in a security module associated to a multimedia unit connected to a managing center supplying control messages authorizing access to broadcast data streams. The security module comprises a processor for executing the instructions, a memory, and a monitoring module for analyzing the instructions before execution by the processor. The managing center comprises a security module emulator generating reference data sets by executing a sequence of instructions induced by data of a given control message in the program. The reference data sets are appended to control messages sent to the security module. The monitoring module analyzes a sequence of program instructions for determining a check data set which is compared with a reference data set received from the control messages. When the reference and check data sets match, the program continues executing. Otherwise, further control message processing stops.
    Type: Application
    Filed: June 8, 2010
    Publication date: December 9, 2010
    Applicant: NAGRAVISION SA
    Inventor: Jean-Bernard FISCHER
  • Patent number: 7848518
    Abstract: A method for generating a root key is described. Stable bits of a plurality of comparator outputs are identified. The root key is selected from a number of the identified stable bits. A statistically unique value is calculated from the root key using a cryptographically secure function. An identifier of the identified stable bits and the statistically unique value are stored in a memory.
    Type: Grant
    Filed: June 29, 2004
    Date of Patent: December 7, 2010
    Assignee: Seagate Technology LLC
    Inventor: Laszlo Hars
  • Patent number: 7840002
    Abstract: Apparati, methods, and computer-readable media for strengthening a one-time pad encryption system. A method embodiment of the present invention comprises the steps of encrypting plaintext (1) with an OTP key (2) in an XOR operation to produce ciphertext (3); and obfuscating the ciphertext (3) with an AutoKey (4) in an XOR operation to produce AutoKeyed ciphertext (5), wherein the AutoKey (4) is a reusable key.
    Type: Grant
    Filed: July 28, 2005
    Date of Patent: November 23, 2010
    Assignee: Vadium Technology, Inc.
    Inventor: Zsolt Ari
  • Publication number: 20100239086
    Abstract: A system that incorporates teachings of the present disclosure may include, for example, a gateway comprising a controller to receive from a communication device a request for media content, receive a key and a record associated with the communications device from an interactive Television (iTV) system, wherein the record comprises a list of entitled media content, determine whether the requested media content is in the list of entitled media content, retrieve the requested media content from the iTV system when the requested media content is determined to be in the list of entitled media content, encrypt the retrieved media content utilizing the key, and transmit the encrypted media content to the communications device. Other embodiments are disclosed.
    Type: Application
    Filed: March 17, 2009
    Publication date: September 23, 2010
    Applicant: AT&T MOBILITY II, LLC
    Inventors: ROBERT JOHNSTON, Frank R. Coppa, James A. Wood
  • Patent number: 7787619
    Abstract: A method and apparatus are disclosed for managing components of a secret key according to a secret sharing scheme. The disclosed secret sharing scheme divides a secret value, R, into n secret components (R1, R2, . . . , Rn) and one super component, S, in such a way that R can be computed from (i) any k or more Ri components (k<n); or (ii) S and any one component of Ri. The secret components (R1, R2, . . . , Rn) are distributed to a number of authorized users. A multiple threshold secret sharing scheme assigns various users in a group into one of a number of classes. Each user class has a corresponding threshold level that indicates the number of users that must come together with their assigned components to obtain access to the shared secret. The multiple threshold scheme divides the secret into n components each having an assigned threshold level (i.e., the number of such components that are required to obtain the secret).
    Type: Grant
    Filed: January 29, 2002
    Date of Patent: August 31, 2010
    Assignee: Avaya Inc.
    Inventors: Mehrdad Nadooshan, Jian Ren
  • Patent number: 7773597
    Abstract: A system, method, apparatus and machine-readable medium for stashing an information packet, received by a network interface device, are provided. The method includes i) extracting information from the received information packet; ii) determining the stashing size of the information packet; and iii) stashing the information packet, based on the determined size. The information can be extracted from the layer-2, layer-3 and layer-4 headers and trailers of the information packet. Dynamic stashing results in an enhanced performance of the communication systems.
    Type: Grant
    Filed: April 20, 2005
    Date of Patent: August 10, 2010
    Assignee: Cisco Technology, Inc.
    Inventor: Jyhren Chen
  • Patent number: 7764789
    Abstract: A bit sequence which is generated by a feedback shift register is decimated with a variable decimation value m (m?|N) in a predetermined manner which is known on the decryption side, i.e. in that every mth bit of the bit sequence is picked out from the bit sequence so as to obtain the key bit stream.
    Type: Grant
    Filed: March 4, 2005
    Date of Patent: July 27, 2010
    Assignee: Infineon Technologies AG
    Inventors: Rainer Goettfert, Berndt Gammel, Kalman Cinkler, Stefan Rueping
  • Patent number: 7756270
    Abstract: An apparatus for enciphering data by which enciphered digital information data with improved cipher strength are obtained by subjecting digital information data to enciphered process responding to random number data or pseudo-random number data produced in accordance with key data, and which comprises an enciphering portion for subjecting an HD signal to enciphering process to produce an enciphered HD signal, a cipher producing portion for producing, in response to key data, a cipher data from which random number data or pseudo-random number data are obtained to be supplied to the enciphering portion, a register for supplying the cipher producing portion with input data, and a line number data extracting portion for extracting line number data from the HD signal to be supplied to the register as initial data.
    Type: Grant
    Filed: May 7, 2003
    Date of Patent: July 13, 2010
    Assignee: Sony Corporation
    Inventors: Tsutomu Shimosato, Yujiro Ito
  • Patent number: 7752449
    Abstract: A system and method for generating a non-repudiatable record of a communications data stream is provided, which is applicable to real-time and quasi-real-time data streams. A binary communication data stream is captured and segmented into defined frames. A key frame is generated for each of a number of data frames containing integrity and authentication information. The key frame is inserted into the data stream to provide an authenticated data stream.
    Type: Grant
    Filed: February 22, 2006
    Date of Patent: July 6, 2010
    Assignee: Avaya, Inc.
    Inventor: Peter Chapman
  • Patent number: 7752453
    Abstract: A method of encrypting and transmitting data and a system for transmitting encrypted data. The method includes one or more different encryption algorithms, and may include employing different encryption algorithms to achieve multiple levels of encryption. A first encryption algorithm is based upon multiple rearrangements of bits representing data to obtain encoded data. A second encryption algorithm is based upon performing multiple XOR operations on bits representing data so that each data word is at least encoded with previous data words. The system comprises first and second computers and a plurality of communication parameters. The two computers are communicably connected to a network, and the second computer is adapted to route a transmission to the first computer. The transmission includes a data part and a header part, both of which are encrypted by the second computer utilizing the communication parameters. The first computer decrypts the transmission utilizing the communication parameters.
    Type: Grant
    Filed: January 8, 2004
    Date of Patent: July 6, 2010
    Assignee: Encryption Solutions, Inc.
    Inventors: Robert Allen Stedron, John L. Chmielewski
  • Patent number: 7751567
    Abstract: Methods and apparatus are presented for providing local authentication of subscribers traveling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
    Type: Grant
    Filed: June 1, 2005
    Date of Patent: July 6, 2010
    Assignee: QUALCOMM Incorporated
    Inventors: Roy F. Quick, Jr., Gregory G. Rose
  • Patent number: 7742598
    Abstract: A parallel processing shrinking key generator is provided. The parallel processing shrinking key generator includes: a selection linear feedback shift register (LFSR); a source LFSR; a selection logic circuit for selecting one of a source bit of the source LFSR and a predetermined input bit according to a selection bit of the selection LFSR; an index counter for assigning an index where output bits of the selection logic circuit are stored at a next clocking of a clock signal; and an output amount register for shifting an output bit of the selection logic circuit according to the assignment of the index counter.
    Type: Grant
    Filed: June 20, 2005
    Date of Patent: June 22, 2010
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Dong Soo Kim, Young Soo Kim, Dae Seon Park, Jang Hong Yoon
  • Patent number: 7742603
    Abstract: An anonymous vehicular broadcast system that has encrypted links between the roadway infrastructure and the vehicles. The vehicles each have a common private key that is generated from a certification key, provided by a certification authority, and a configuration key that is generated at each power up of the vehicle. The configuration key is not stored in the vehicle so that the vehicle is only stores a portion of the private key.
    Type: Grant
    Filed: March 27, 2006
    Date of Patent: June 22, 2010
    Assignee: Nissan Technical Center North America, Inc.
    Inventors: Steve Tengler, Scott Andrews, Ronald Heft
  • Publication number: 20100142703
    Abstract: A method for processing streaming media contents is provided. The method includes: encrypting the streaming media contents and generating corresponding Entitlement Control Message (ECM) and Entitlement Management Message (EMM); and transmitting the encrypted streaming media contents, the ECM and the EMM to a terminal device, in which each I frame of the encrypted streaming media contents is segmented into multiple data packets for transmission and the ECM is transmitted during the transmission of the multiple data packets. A conditional access system and a system for processing streaming media contents are also provided. Through the above technical solutions, fuzzy screen phenomena in processing streaming media contents may be eliminated, channel-switching time or dark screen time may be reduced, and thus the user's experience may be improved.
    Type: Application
    Filed: February 12, 2010
    Publication date: June 10, 2010
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Zijing HUANG
  • Patent number: 7734050
    Abstract: A wireless vehicle and infrastructure system is described that allows for utilization of a quasi-anonymous common private key/digital certificate pool, such that all vehicles are authenticated to the system, but no one vehicle/user can be readily identified during their use of the system because of their use of set of common private key/digital certificate pairs that are assigned to each vehicle from the pool and are common across multiple vehicles. Vehicle/user anonymity is only temporarily removed during vehicle/user re-authentication and re-issuance of new common private key/digital certificate pairs from the pool in the wireless vehicle and infrastructure system.
    Type: Grant
    Filed: March 27, 2006
    Date of Patent: June 8, 2010
    Assignee: Nissan Technical Center North America, Inc.
    Inventors: Steve Tengler, Scott Andrews, Ronald Heft
  • Patent number: 7725715
    Abstract: The present invention is directed to a three-phase encryption method and a three-phase decryption method, and an apparatus implementing the three-phase encryption method and/or the three-phase decryption method. To encrypt a message according to the three-phase encryption method, a content of a message is converted from a first form M to a second form M?; the content of the message is separated according to a spacing pattern; and the content of the message is scrambled according to a scrambling pattern. To decrypt the message encrypted using the three-phase encryption method, the scrambling and spacing patterns are reversed, and the content of the message is converted from the second form M? to the first form M.
    Type: Grant
    Filed: February 24, 2005
    Date of Patent: May 25, 2010
    Assignee: Access Business Group International LLC
    Inventors: Nima Veiseh, David W. Baarman, Thomas Jay Leppien
  • Publication number: 20100119060
    Abstract: The present invention provides a receiving apparatus including a device key generating unit which generates a device key, a work key generating unit which generates a work key, a device key storing unit which sequentially stores the generated device key, every time the device key is updated, and a recording unit which stores a digital broadcast signal in a transport stream format, wherein in a case where the device key generating unit cannot generate, from the stored transport stream, a device key necessary for descrambling the stored transport stream when the stored transport stream is to be reproduced, the work key generating unit decrypts an encrypted work key that is obtained from the stored transport stream, using the device key stored in the device key storing unit, and generates a work key.
    Type: Application
    Filed: October 9, 2009
    Publication date: May 13, 2010
    Applicant: CANON KABUSHIKI KAISHA
    Inventors: Ryuji Nishida, Yoshihiro Saga, Kenichi Morikawa, Kazuhiko Nakazawa
  • Publication number: 20100067688
    Abstract: Described herein are various embodiments of a coding technique that utilize a stream cipher for switching between first and second coding conventions for encoding a symbol sequence. The first coding convention specifies a first mapping between a symbol and a first codeword and the second coding convention specified a second mapping between the symbol and a second codeword. According to the invention, a key generated by the stream cipher is used to selected one of the first and second coding convention and the mapping of the selected coding convention is then utilized for encoding the symbol.
    Type: Application
    Filed: September 18, 2009
    Publication date: March 18, 2010
    Applicant: The Hong Kong University of Science and Technology
    Inventors: Oscar Chi Lim Au, Jiantao Zhou
  • Patent number: 7680278
    Abstract: A system and method for secure wireless cryptographic communication among participants in a wireless computing network is presented. This secure communication method is based on a random modulation technique and a domino match. Once the initial modulation scheme is selected, each data transmission includes an indication of what modulation scheme should be used for the next data transmission. If a given number of bits are to be used, the modulation scheme for the final transmission may be limited to complete the bit transfer. The bit value assignments within particular modulation schemes may also be varied for each subsequent transmission.
    Type: Grant
    Filed: February 4, 2004
    Date of Patent: March 16, 2010
    Assignee: Microsoft Corporation
    Inventors: Amer Hassan, Christopher J. Corbett
  • Publication number: 20100020963
    Abstract: In accordance with one embodiment, a method for securing control words is provided. The method includes receiving scrambled digital content in a descrambler integrated circuit. The method further includes receiving an encrypted control word in the descrambler integrated circuit, decrypting the encrypted control word using a key stored in a register circuit of the descrambler integrated circuit, and descrambling the scrambled digital content in the descrambler integrated circuit using the decrypted control word.
    Type: Application
    Filed: November 13, 2007
    Publication date: January 28, 2010
    Applicants: Sony Corporation, Sony Electronics, Inc.
    Inventor: Brant L. Candelore
  • Patent number: 7643636
    Abstract: A plurality of storage location numbers (“SLNs”), each having a cryptographic period, is received at a first device (100). A system cryptographic period is determined based on the SLN cryptographic periods. Prior to expiration of each system cryptographic period, if at least one SLN requires an updated, the first device sends updated key material for the at least one SLN. A second device (102) maintains first, second, and third keysets, wherein the first and second keysets comprise key material. The second device receives a message to make the first keyset active, and a second message for updating at least a portion of the key material in the second keyset with updated key material for at least one SLN. The second device makes the third keyset equivalent to the second keyset, updates the second keyset with the updated key material, and receives a third message to make the second keyset active.
    Type: Grant
    Filed: September 3, 2003
    Date of Patent: January 5, 2010
    Assignee: Motorola, Inc.
    Inventor: Chris A. Kruegel
  • Patent number: 7643637
    Abstract: A system that facilitates efficient code construction comprises a component that receives a first code and a transformation component that transforms the first code to a new code. The new code has essentially same length parameters as the first code but is hidden to a computationally bounded adversary. The first code can be designed in the noise model and appear random to a computationally bounded adversary upon transformation.
    Type: Grant
    Filed: February 10, 2004
    Date of Patent: January 5, 2010
    Assignee: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Kamal Jain
  • Patent number: 7623656
    Abstract: Stream cipher encryption and message authentication. Stream cipher encryption is performed by generating a keystream at the transmitting end from a state value, applying the keystream to plaintext to generate an encrypted message block having at least a portion of the plaintext converted to ciphertext, and updating the state value as a function of said at least a portion of the plaintext. Stream cipher decryption is performed by generating a keystream at the receiving end from the same state value, applying the keystream to the encrypted message block to convert the ciphertext to plaintext, and updating the state value as a function of the plaintext. Message authentication techniques are also described.
    Type: Grant
    Filed: February 17, 2005
    Date of Patent: November 24, 2009
    Assignee: QUALCOMM Incorporated
    Inventors: Phillip Hawkes, Michael Paddon, Gregory Gordon Rose
  • Patent number: 7620809
    Abstract: A method of registering network devices in a digital rights management system (DRMS) includes receiving a digital certificate transmitted by the network device requesting registration and verifying the validity of the certificate. The DRMS may then send cryptographic information to the applying network device. The network device may be authorized for registration via a user interface to the DRMS. The DRMS may conduct a proximity test to determine of the network device is proximate to the DRMS. If the certificate is validated, authorization is received, and the proximity test indicates that the network device is proximate to the DRMS, the network device may be registered. A registered network device is then authorized to play protected digital content.
    Type: Grant
    Filed: April 15, 2005
    Date of Patent: November 17, 2009
    Assignee: Microsoft Corporation
    Inventors: Richard D. Prologo, Eduardo P. Oliveira, Clifford P. Strom, Brian P. Evans, Benjamin Brooks Cutter, Anand D. Paka
  • Patent number: 7587607
    Abstract: Receiving a request for an attestation of platform configuration from an attestation requestor, receiving an acceptable configuration, and if the platform matches the acceptable configuration, sending an attestation of platform configuration including a signed response indicating that the platform configuration matches an acceptable configuration to the attestation requester.
    Type: Grant
    Filed: December 22, 2003
    Date of Patent: September 8, 2009
    Assignee: Intel Corporation
    Inventors: Ernie F. Brickell, Matthew D. Wood
  • Patent number: 7587045
    Abstract: The present invention is directed to a system and method for secure transmission of electronic document data on a network. The method begins with the receipt of user identification data associated with the identity of a user of document processing devices on the associated network. A password key, composed of a first share and a second share, is then generated from the user identification data. The first share is then communicated to an associated storage area. Electronic document data is then received, and an encryption key is randomly generated. The electronic document data is then encrypted using the encryption key. The second share is then appended to the encrypted electronic document and the combined data is communicated to an associated document processing device.
    Type: Grant
    Filed: October 3, 2005
    Date of Patent: September 8, 2009
    Assignees: Kabushiki Kaisha Toshiba, Toshiba Tec Kabushiki Kaisha
    Inventors: Michael Yeung, Sameer Yami, Amir Shahindoust
  • Publication number: 20090208010
    Abstract: The present invention makes use of techniques such as those described by Boneh and Franklin to allow for the realisation of a pseudo-asymmetric encryption scheme whereby one public encryption corresponds to a plurality of private decryption keys. This scheme therefore provides a solution to the problem of inefficient use of bandwidth in asymmetrical encryption schemes which inherently require that a plurality of encryptions of data be broadcast to a plurality of receivers. The invention further ensures that the advantage of traceability, typical found in asymmetric encryption schemes, is maintained due to the characteristic that each receiver uses a unique traceable decryption key. The traceability thus achieved by the present invention allows for the revocation of a security module which has been involved in the abusive use of conditional access data, particularly by means of clones of security modules whose security has been compromised.
    Type: Application
    Filed: March 13, 2009
    Publication date: August 20, 2009
    Inventors: Pascal Junod, Alexandre Karlov, Nicolas Fischer
  • Patent number: 7570766
    Abstract: Systems, methods, and data structures for transparently embedding non-compliant data in a data stream are described. One method includes embedding random encryption/decryption information into an MEPG multimedia, video, or audio stream transparently to an MPEG decoder in an ISO/MPEG 13818-1 compliant system to control access. The invention works for variable length data streams and involves a PES header. Spare bytes, stuffing bytes, or additional bytes as defined in the MPEG specification for PES headers are used to store key information by a computer capable of modifying the original data stream. There is no need for a parallel data stream for the key information because the key information is transparently inserted directly into the data stream. Additional information is embedded into the data stream that can be used for encryption/decryption without having to modify other components in a playback system.
    Type: Grant
    Filed: March 1, 2002
    Date of Patent: August 4, 2009
    Assignee: Intel Corporation
    Inventors: Richard P. Mangold, Keith L. Shippy, Ajit P. Joshi