Key Sequence Signal Combined With Data Signal Patents (Class 380/43)
  • Patent number: 8331558
    Abstract: The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect to one another. The method of performing elliptic curve cryptography is based on the elliptic curve discrete logarithm problem. It is well known that an elliptic curve discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Grant
    Filed: February 18, 2010
    Date of Patent: December 11, 2012
    Assignee: King Fahd University of Petroleum and Minerals
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Patent number: 8320561
    Abstract: Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header that indicates a keyset employed in connection with data in a protocol data unit. In addition, a route indicator can be provided in a radio link control header that distinguishes a source cell and a target cell in networks configured without RLC reset.
    Type: Grant
    Filed: August 5, 2008
    Date of Patent: November 27, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Peter Anthony Barany, Arnaud Meylan, Sai Yiu Duncan Ho, Francesco Grilli, Nathan Edward Tenny, Rashid Ahmed Akbar Attar
  • Patent number: 8315382
    Abstract: A method for monitoring execution of a sequence of data processing program instructions in a security module associated to a multimedia unit connected to a managing center supplying control messages authorizing access to broadcast data streams. The security module comprises a processor for executing the instructions, a memory, and a monitoring module for analyzing the instructions before execution by the processor. The managing center comprises a security module emulator generating reference data sets by executing a sequence of instructions induced by data of a given control message in the program. The reference data sets are appended to control messages sent to the security module. The monitoring module analyzes a sequence of program instructions for determining a check data set which is compared with a reference data set received from the control messages. When the reference and check data sets match, the program continues executing. Otherwise, further control message processing stops.
    Type: Grant
    Filed: June 8, 2010
    Date of Patent: November 20, 2012
    Assignee: Nagravision S.A.
    Inventor: Jean-Bernard Fischer
  • Patent number: 8307210
    Abstract: A method for validating a cryptographic token includes (a) operating the cryptographic token to generate a pseudo-random number for authentication purposes by using a cryptographic seed uniquely associated with the cryptographic token, the cryptographic seed having been cryptographically generated using a precursor value, (b) receiving a first value from the cryptographic token, the first value being the pseudo-random number generated by the cryptographic token, (c) inputting the first value and the precursor value into a trusted computing platform, and (d) operating the trusted computing platform to generate a validation signal if the first value can be derived using a specified algorithm from the precursor value, but to generate a failure signal if the first value cannot be derived using the specified algorithm from the precursor value. Accompanying methods and apparatus are also provided.
    Type: Grant
    Filed: May 2, 2008
    Date of Patent: November 6, 2012
    Assignee: EMC Corporation
    Inventor: William M. Duane
  • Patent number: 8300813
    Abstract: Secure communication of information is effected from a first party to a second party when the first party knows its own global location and the global location of the second party, and employs what essentially is an undiscoverable code signal that is broadcast to, and received by, both the first and the second parties. The first party securely communicates information to the second party by modifying the code signal with the information that is to be communicated and sends the modified code signal to the second party. Illustratively, the code signal is related to the Y component of a GPS signal.
    Type: Grant
    Filed: August 29, 2008
    Date of Patent: October 30, 2012
    Assignee: The Boeing Company
    Inventors: David S DeLorenzo, Per K Enge, Sherman C. Lo
  • Patent number: 8284930
    Abstract: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that reduces the overall number of doubling and addition operations thereby providing an efficient method for multiple scalar multiplication. The elements in the pairs for P and Q method are combined into a single pair, and the bits in k and s are evaluated at each step as bit pairs. When the bits in k and s are equal, only one doubling operation and one addition operation are needed to compute the current pair, and when the bits in k and s are not equal, only one doubling operation is needed and two addition operations.
    Type: Grant
    Filed: July 6, 2011
    Date of Patent: October 9, 2012
    Assignee: Certicom Corp.
    Inventors: Adrian Antipa, Yuri Poeluev
  • Patent number: 8284932
    Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.
    Type: Grant
    Filed: November 23, 2011
    Date of Patent: October 9, 2012
    Assignee: Adobe Systems Incorporated
    Inventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh
  • Patent number: 8280045
    Abstract: A text-input device and method is provided. The device includes a display unit that displays a user interface, which is divided into a plurality of areas each including a plurality of cells where predetermined text is displayed, an input unit that includes a plurality of text-input units to provide a focusing signal that focuses on a predetermined cell in the displayed user interface and a selecting signal that selects the focused cell, a user interface providing unit that generates a control signal corresponding to the selected cell with reference to a mapping table according to whether the selecting signal is available, and a control unit that performs a control command based on the control signal, wherein the plurality of text-input units correspond to the areas.
    Type: Grant
    Filed: November 9, 2006
    Date of Patent: October 2, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Sang-jin Lee, Kyun-hoe Park, Kyoung-won Kim, Woon-geun Kwak, Dae-sun Rhee
  • Patent number: 8275997
    Abstract: A method of encrypting and transmitting data and a system for transmitting encrypted data. The method includes one or more different encryption algorithms, and may include employing different encryption algorithms to achieve multiple levels of encryption. A first encryption algorithm is based upon multiple rearrangements of bits representing data to obtain encoded data. A second encryption algorithm is based upon performing multiple XOR operations on bits representing data so that each data word is at least encoded with previous data words. The system comprises first and second computers and a plurality of communication parameters. The two computers are communicably connected to a network, and the second computer is adapted to route a transmission to the first computer. The transmission includes a data part and a header part, both of which are encrypted by the second computer utilizing the communication parameters. The first computer decrypts the transmission utilizing the communication parameters.
    Type: Grant
    Filed: July 1, 2010
    Date of Patent: September 25, 2012
    Assignee: Encryption Solutions, Inc.
    Inventors: Robert Allen Stedron, John L. Chmielewski
  • Patent number: 8265269
    Abstract: The present invention provides a receiving apparatus including a device key generating unit which generates a device key, a work key generating unit which generates a work key, a device key storing unit which sequentially stores the generated device key, every time the device key is updated, and a recording unit which stores a digital broadcast signal in a transport stream format, wherein in a case where the device key generating unit cannot generate, from the stored transport stream, a device key necessary for descrambling the stored transport stream when the stored transport stream is to be reproduced, the work key generating unit decrypts an encrypted work key that is obtained from the stored transport stream, using the device key stored in the device key storing unit, and generates a work key.
    Type: Grant
    Filed: October 9, 2009
    Date of Patent: September 11, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventors: Ryuji Nishida, Yoshihiro Saga, Kenichi Morikawa, Kazuhiko Nakazawa
  • Patent number: 8261055
    Abstract: A first information processing apparatus encrypts data that it receives from a second information processing apparatus, and transmits the data thus encrypted to an external device. The second information processing apparatus transmits the data to the first information processing apparatus according to a data size that results after a data size being necessary for communication of the encrypted data is subtracted from a specified data size.
    Type: Grant
    Filed: June 27, 2007
    Date of Patent: September 4, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Masahiko Sakai
  • Patent number: 8249251
    Abstract: A device for generating a seedless pseudo-random number, according to one embodiment, includes a first register containing a secret code; a second register containing a first random number generated locally and a second random number generated at a remote device; and an exclusive OR (XOR) circuit receiving output from the first and second registers and applying an XOR function to the outputs, a result of the XOR function being fed into the second register in a subsequent cycle.
    Type: Grant
    Filed: September 14, 2010
    Date of Patent: August 21, 2012
    Inventors: Roger Green Stewart, Daniel Noah Paley
  • Patent number: 8243926
    Abstract: An encryption device, comprising: detection portion for detecting a TS header, a PES header, a sequence header, a GOP header, and a sequence end code for a transport stream not encrypted; and encryption portion for encrypting the transport stream except the TS header, the PES header, the sequence header, the GOP header, and the sequence end code. An editing device, comprising: detection portion for detecting a TS header, a PES header, a sequence header, a GOP header, and a sequence end code in a transport stream; and editing portion for editing the encrypted transport stream without decryption in units of TS packets ranging from a TS packet where the GOP header is detected to a TS packet previous to a TS packet where a subsequent GOP header is detected out of TS packets having an identical PID.
    Type: Grant
    Filed: September 30, 2004
    Date of Patent: August 14, 2012
    Assignee: NEC Personal Computers, Ltd.
    Inventor: Yuichi Sakai
  • Patent number: 8233616
    Abstract: An encryption processing unit executes an arithmetic operation decided in advance and outputs an arithmetic result as an element on an algebraic torus. A compressing unit outputs, when the arithmetic result is an exceptional point representing an element on the algebraic torus that cannot be compressed by a compression map for compressing an element on the algebraic torus into affine representation, a compression result obtained by compressing the arithmetic result according to the compression map and outputs, when the arithmetic result is the exceptional point, an element belonging to a specific set decided in advance that does not overlap a set to which a compression result obtained by compressing the arithmetic result, which is not the exceptional point, belongs.
    Type: Grant
    Filed: March 18, 2009
    Date of Patent: July 31, 2012
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Hirofumi Muratani, Tomoko Yonemura, Atsushi Shimbo, Kenji Ohkuma, Taichi Isogai, Yuichi Komano, Kenichiro Furuta, Yoshikazu Hanatani, Hanae Ikeda
  • Patent number: 8234217
    Abstract: A method of operating a digital program playback device, including: receiving, via a first communications network, a data stream including an encrypted data portion representative of a program; identifying, from the received data stream, an identifier associated with the program; transmitting the program identifier and a device identifier associated with the digital program playback device to an authorization device via a second communications network; receiving, via the second communications network, a decryption key in response to the transmission; and, decrypting the data stream using the decryption key and generating an output signal for playback of the program.
    Type: Grant
    Filed: March 17, 2005
    Date of Patent: July 31, 2012
    Assignee: Thomson Licensing
    Inventor: Mike Arthur Derrenberger
  • Patent number: 8218768
    Abstract: A cryptosync design comprising (1) a channel identifier indicative of a particular channel via which a data packet is sent, (2) an extended time stamp indicative of a time value associated with the data packet, and (3) a counter indicative of a packet count associated with the data packet. The lengths of the extended time stamp and counter fields and the time unit for the extended time stamp are parameters that may be configured for each channel. At the sender, the extended time stamp for the cryptosync may be obtained from the System Time maintained by the sender. The counter value for the cryptosync may be provided by a counter that is maintained for the channel by the sender. The sender may include a time stamp and/or the counter value, if they are needed to derive the cryptosync at the receiver, in a header of the data packet.
    Type: Grant
    Filed: March 25, 2002
    Date of Patent: July 10, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Ramin Rezaiifar, Paul E. Bender, Roy Franklin Quick, Jr.
  • Patent number: 8213616
    Abstract: Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device when an eavesdropper device is listening on an eavesdropper channel. This example method includes transmitting, in a first time period in which signal quality on the main channel is better than signal quality on the eavesdropper channel, symbols that are randomly selected from a set of symbols. The method also includes transmitting, in a second time period in which signal quality on the main channel is not better than signal quality on the eavesdropper channel, coding information associated with the randomly selected symbols. The method also includes reconciling the randomly selected symbols using the coding information.
    Type: Grant
    Filed: September 18, 2007
    Date of Patent: July 3, 2012
    Assignees: Georgia Tech Research Corporation, Cambridge Enterprise Limited, Universidade Do Porto
    Inventors: Matthieu Ratislav Bloch, Miguel Raul Dias Rodrigues, Joao Francisco Cordeiro de Oliveira Barros, Steven William McLaughlin
  • Patent number: 8213050
    Abstract: An image processing device, which includes: an original reception unit that receives an original image; a dot image generation unit that generates, on the basis of additive information to be added to the original image, a dot image in which a plurality of dots each formed by one or more pixels are arranged; a state alteration unit that, when any of the dots in the dot image is determined to be not extractable, alters a state of the non-extractable dot on the basis of a relationship between a position on the dot image generated by the dot image generation unit and a corresponding position on the original image; and a composite image generation unit that generates a composite image by superimposing, on the original image, the dot image having the state of the non-extractable dot altered by the state alteration unit.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: July 3, 2012
    Assignee: Fuji Xerox Co., Ltd.
    Inventor: Yasuhiko Iwamoto
  • Patent number: 8189787
    Abstract: A data communication apparatus is highly concealable and significantly increases time necessary for an eavesdropper to analyze cipher text. A multi-level code generation section generates, by using predetermined key information, a multi-level code sequence in which a signal level changes so as to be random numbers. The multi-level processing section combines a multi-level code sequence and information data, and generates a multi-level signal having a level corresponding to a combination of the multi-level code sequence and the information data. In the multi-level code generation section, a random number sequence generation section generates a binary random number sequence by using the predetermined key information. A multi-level conversion section generates a multi-level code sequence from the binary random number sequence in accordance with a predetermined encoding rule.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: May 29, 2012
    Assignee: Panasonic Corporation
    Inventors: Tomokazu Sada, Masaru Fuse, Satoshi Furusawa, Tsuyoshi Ikushima
  • Patent number: 8180048
    Abstract: The invention generally relates to computational transformation process, which has applications in cryptography, random number generation, hash code generation etc. The computational transformation module uses a keyset, which is designed using a two dimensional array. Since the process of forward transformation used in the invention is a symmetric encryption process and if used to send data securely over a communications network, the same keyset needs to be present at the sending computer to encrypt the data and the receiving computer to go through a reverse transformation and decrypt the data. When the first ‘n’ bit block of input-data is transformed into the first ‘m’ bit block of output-data, the keyset is transformed into a different keyset based on a nonlinear or one-way transformation on the keyset. The next input block is encrypted using a transformed keyset, hence satisfying Shanons theory of perfect secrecy.
    Type: Grant
    Filed: September 14, 2004
    Date of Patent: May 15, 2012
    Inventor: Prahlad P Singanamala
  • Patent number: 8165296
    Abstract: Embodiments of the invention provide for encryption and decryption of data in a TDMA network using TDMA time values. In some embodiments, TDMA time values can be transmitted to terminals from a network controller using a burst time plan. These TDMA time values along with other data and/or counters can be combined to create a one-time key, which can be used to both encrypt data and/or decrypt data. Embodiments of the invention can decrease communication overhead by using the TDMA time value for TDMA purposes as well as for encryption purposes.
    Type: Grant
    Filed: May 27, 2009
    Date of Patent: April 24, 2012
    Assignee: ViaSat, Inc.
    Inventor: Edward Smith
  • Patent number: 8160253
    Abstract: A method for wireless data transmission between a base station and a transponder is provided, whereby a message, comprising at least one command and one data sequence, is transmitted by the base station, the message is received and evaluated by the transponder, at least one key is provided in the transponder after receipt of the command and before complete receipt of the message and the key is transmitted to the base station, the key is detected by the base station, and parts of the message, still to be transmitted, and/or subsequent messages are encoded by the base station with the key.
    Type: Grant
    Filed: June 25, 2007
    Date of Patent: April 17, 2012
    Assignee: Atmel Corporation
    Inventors: Martin Fischer, Ulrich Friedrich, Jens Masuch, Michael Pangels, Dirk Ziebertz
  • Patent number: 8144872
    Abstract: A system and method for generating analog-digital mixed chaotic signal and an encryption communication method thereof are provided. In the system and method, the complementarity between continuous chaotic systems (12, 22) and digital chaotic systems (11, 21) are reasonably utilized. In specific, the digital chaotic systems, which are separated from each other, control the local continuous chaotic systems respectively, so as to enable the continuous chaotic systems, which are also separated from each other, to stably and synchronously work for a long time. Thus, there is no need to transmit the synchronizing signal, and as a result the anti-attack capability is increased effectively. Further, the continuous chaotic systems disturb the local digital chaotic systems to prevent the digital chaotic systems from degradation. This compensates the drawbacks of digital chaotic systems.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: March 27, 2012
    Assignees: Huawei Technologies Co., Ltd., Huazhong University of Science & Technology
    Inventors: Hanping Hu, Zuxi Wang, Xiaogang Wu, Lin Zhou, Ziqi Zhu, Jiwei Wei, Jie Yang, Pengyu Lu, Zhibin Zheng
  • Patent number: 8144368
    Abstract: This disclosure describes methods for using embedded auxiliary signals in documents for copy detection and other applications. In on application, the auxiliary signal is formed as an array of elements selected from a set of print structures with properties that change differently in response to copy operations. These changes in properties of the print structures that carry the embedded auxiliary signal are automatically detectable. For example, the changes make the embedded auxiliary signal more or less detectable. The extent to which the auxiliary data is detected forms a detection metric used in combination with one or more other metrics to differentiate copies from originals. Examples of sets of properties of the print structures that change differently in response to copy operations include sets of colors (including different types of inks), sets of screens or dot structures that have varying dot gain, sets of structures with different aliasing effects, etc.
    Type: Grant
    Filed: November 26, 2003
    Date of Patent: March 27, 2012
    Assignee: Digimarc Coporation
    Inventors: Tony F. Rodriguez, Alastair M. Reed, Ravi K. Sharma, Osama M. Alattar, Brett T. Hannigan, Kenneth L. Levy, Hugh L. Brunk, Geoffrey B. Rhoads, Ammon E. Gustafson
  • Patent number: 8135130
    Abstract: The data encryption apparatus with a data converting unit splits 256-bit input data into 32-bit data blocks A1, B1, A2, and B2. A first combining unit performs an exclusive OR operation on A1 and B1, and on A2 and B2. A first scramble unit branches A1, A2, and the results of the exclusive OR operations (C1 and C2) into three data blocks each, and for each set of three data blocks, shift-rotates two of the data blocks and combines the shifted data blocks with the remaining data block. A second combining unit performs an exclusive OR operation on D1 and E2, and on D2 and E1, which are the results of the processing performed by the first scramble unit. A block concatenating unit concatenates the results of the operations performed by the second combining unit. A second scramble unit branches the concatenated data into three data blocks, shift-rotates two of the data blocks and combines the two shifted data blocks with the remaining data block.
    Type: Grant
    Filed: June 19, 2007
    Date of Patent: March 13, 2012
    Assignee: Panasonic Corporation
    Inventors: Masao Nonaka, Kaoru Yokota, Motoji Ohmori
  • Patent number: 8125691
    Abstract: A watermark information embedding apparatus generates a document image from electronic document data that has been input thereto, modifies the electronic document data based upon the document image and embeds information in the electronic document data. The apparatus includes a document image generator for generating a document image from the electronic document data; a document analyzer for detecting layout information of each constituent image in the generated document image; a normalization information calculation unit for calculating normalization information, which is for normalizing placement of each constituent image, based upon the detected layout information; a modification unit for modifying the electronic document data; and an embedding unit for embedding information in the modified electronic document data.
    Type: Grant
    Filed: October 1, 2008
    Date of Patent: February 28, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kenichi Okihara
  • Patent number: 8127138
    Abstract: The invention as disclosed is of a method to authenticate identify and trace sonar transmissions and echoes by embedding transparent, secure and robust digital watermarks in signal space, where the additional information incurs no cost in bandwidth. The complex short time Fourier transform is selected as the domain for embedding the digital watermark, secured by a secret key, in the time frequency representation of the signal. The watermark is designed through an iterative optimization step. This step insures that the watermarked sonar is also realizable. Selection of the time frequency region for watermarking is driven by avoidance of interference with the sonar itself, or in case of network operation, other watermarks. In addition, the selected time-frequency region remains robust to sound channel and other transmission effects. Sonar echoes are authenticated in the time-frequency plane by a correlation receiver tuned to the watermarked region using the secret key.
    Type: Grant
    Filed: September 29, 2008
    Date of Patent: February 28, 2012
    Assignee: The United States of America as represented by the Secretary of the Navy
    Inventors: Robert S. Lynch, G. Clifford Carter, Bijan Mobasseri
  • Patent number: 8111828
    Abstract: A management system generates a sequence of keys and an identifier of each key in the sequence. A current key in the sequence and the identifier of the current key are transferred from the management system to a storage system. The storage system encrypts the data into encrypted data using the current key. The storage system stores the identifier and the encrypted data. The identifier and the encrypted data are retrieved from the storage system. The key in the sequence identified by the identifier is transferred from the management system to the storage system. The storage system decrypts the encrypted data using the decryption key.
    Type: Grant
    Filed: July 31, 2007
    Date of Patent: February 7, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Shankar Raman, Kiran Kumar Malle Gowda
  • Patent number: 8107621
    Abstract: Mechanisms for providing an encrypted file system are provided. The mechanisms use a combination of encryption methodologies so as to reduce the amount of decryption and re-encryption that is necessary to a file in the Encrypted File System in the event that the file needs to be modified. The encryption methodologies are interleaved, or alternated, with regard to each block of plaintext. In one illustrative embodiment, Plaintext Block Chaining (PBC) and Cipher Block Chaining (CBC) encryption methodologies are alternated for encrypting a sequence of blocks of data. The encryption of a block of plaintext is dependent upon the plaintext or a cipher generated for the plaintext of a previous block of data in the sequence of blocks of data so that the encryption is more secure than known Electronic Code Book encryption methodologies.
    Type: Grant
    Filed: August 20, 2008
    Date of Patent: January 31, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ufuk Celikkan, William C. Conklin, Shawn P. Mullen, Ravi A. Shankar
  • Patent number: 8089661
    Abstract: In a computer system in which information represented by digital data is output to plural pages of recording medium, and then information on the plural pages of recording medium is read to use digital data representing the read information, authentication information is embedded in information of a start page selected by the computer system; a page number of the start page embedded the authentication information is notified to a user; information on the plural pages of recording medium is read, wherein the start page is positioned so as to be read first; digital data read from the plural pages of recording medium is authenticated based on the authentication information embedded in the start page; and a process for the digital data read from the plural pages of recording medium is controlled in accordance with a result of the authentication.
    Type: Grant
    Filed: June 19, 2008
    Date of Patent: January 3, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Ryuta Mori
  • Patent number: 8055903
    Abstract: A method is disclosed that enables the transmission of a digital message along with a corresponding information signal, such as audio or video. The supplemental information contained in digital messages can be used for a variety of purposes, such as enabling or enhancing packet authentication. In particular, a telecommunications device that is processing an information signal from its user, such as a speech signal, encrypts the information signal by performing a bitwise exclusive-or of an encryption key stream with the information signal stream. The device, such as a telecommunications endpoint, then intersperses the bits of the digital message throughout the encrypted signal in place of those bits overwritten, in a process referred to as “watermarking.” The endpoint then transmits the interspersed digital message bits as part of a composite signal that also comprises the encrypted information bits. No additional bits are appended to the packet to be transmitted, thereby addressing compatibility issues.
    Type: Grant
    Filed: February 15, 2007
    Date of Patent: November 8, 2011
    Assignee: Avaya Inc.
    Inventors: Akshay Adhikari, Sachin Garg, Anjur Sundaresan Krishnakumar, Navjot Singh
  • Patent number: 8045707
    Abstract: Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for example, encrypted data. The processor may be coupled to the memory and may include, for example, a decryptor that decrypts the encrypted data. The decryptor may be adapted, for example, to variably bit roll the encrypted data, to fixedly bit shuffle the bit-rolled data, to add a first key to the bit-shuffled data and to process the added data with a second key.
    Type: Grant
    Filed: October 28, 2003
    Date of Patent: October 25, 2011
    Assignee: Broadcom Corporation
    Inventors: Steve W. Rodgers, Sherman (Xuemin) Chen, Iue-Shuenn Chen
  • Patent number: 8045705
    Abstract: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that reduces the overall number of doubling and addition operations thereby providing an efficient method for multiple scalar multiplication. The elements in the pairs for P and Q method are combined into a single pair, and the bits in k and s are evaluated at each step as bit pairs. When the bits in k and s are equal, only one doubling operation and one addition operation are needed to compute the current pair, and when the bits in k and s are not equal, only one doubling operation is needed and two addition operations.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: October 25, 2011
    Assignee: Certicom Corp.
    Inventors: Adrian Antipa, Yuri Poeluev
  • Patent number: 8023159
    Abstract: The present invention provides methods and apparatus for embedding an identifying pattern of visible speckles into the digitized image of each page of a document. A speckle is a cluster of black or white pixels. Speckles are printed as black speckles on the white paper, or conversely, as areas of missing black removed from the black text characters, called white speckles. The collective pattern of all embedded black and white speckles on a single document page is called a specklemark. A specklemark can survive contrast manipulations on photocopiers and binary rasterization done by fax scanning prior to data transmission. The random pattern of the black and white speckles visible in the digitized image of a document page can be detected automatically, and by systematically matching the detected pattern with those known to have been embedded into marked copies of a document page, a specific document copy can be identified.
    Type: Grant
    Filed: July 9, 2008
    Date of Patent: September 20, 2011
    Assignee: International Business Machines Corporation
    Inventors: Gordon W. Braudaway, Frederick C. Mintzer
  • Publication number: 20110200188
    Abstract: The method of performing cipher block chaining using elliptic polynomial cryptography allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the utilization of cipher block chaining based upon both the elliptic polynomial and its twist, regardless of whether the elliptic polynomial and its twist are isomorphic with respect to one another. The method of performing cipher block chaining is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Application
    Filed: February 18, 2010
    Publication date: August 18, 2011
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Publication number: 20110200186
    Abstract: The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect to one another. The method of performing elliptic curve cryptography is based on the elliptic curve discrete logarithm problem. It is well known that an elliptic curve discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Application
    Filed: February 18, 2010
    Publication date: August 18, 2011
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Publication number: 20110200187
    Abstract: Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of secret keys in the message bit string. The method of performing elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem. It is well known that an elliptic polynomial discrete logarithm problem is a computationally “difficult” or “hard” problem.
    Type: Application
    Filed: February 18, 2010
    Publication date: August 18, 2011
    Inventors: Lahouari Ghouti, Mohammad K. Ibrahim, Adnan A. Gutub
  • Publication number: 20110182424
    Abstract: A method begins by a processing module receiving data segments of a data stream to produce received data segments. The method continues with the processing module encrypting a data segment of the received data segments to produce an encrypted data segment and dispersed storage error encoding the encrypted data segment to produce a set of encoded data slices in order of receiving the data segments. The method continues with the processing module buffering encoded data slices of sets of the encoded data slices unit to produce buffered encoded data slices and comparing a number of buffered encoded data slices to a threshold. The method continues with the processing module outputting the encoded data slices of the buffered encoded data slices based on a pseudo-random sequencing order when the number of buffered encoded data slices compares favorably to the threshold.
    Type: Application
    Filed: November 28, 2010
    Publication date: July 28, 2011
    Applicant: CLEVERSAFE, INC.
    Inventors: Gary W. Grube, Timothy W. Markison
  • Patent number: 7970140
    Abstract: A transmitting node produces synchronization data to be inserted into plain text and encrypts the thus generated data into multi-valued data so as to transmit the data. The synchronization data indicates the position of a running key used for encryption. A receiving node decrypts a signal including the synchronization data using the running key and detects the synchronization data from the signal to confirm synchronization of the running key between transmitting and receiving nodes. Then, the receiving node transmits a synchronization confirmation signal to the transmitting node. If the transmitting node does not receive the synchronization confirmation signal, it determines that synchronization of the running key is shifted, and re-synchronization is performed. To perform re-synchronization, a running key ahead of the position of the running key associated with synchronization data that has been stored is generated.
    Type: Grant
    Filed: April 26, 2007
    Date of Patent: June 28, 2011
    Assignee: Hitachi Information & Communication Engineering, Ltd.
    Inventors: Takeshi Hosoi, Katsuyoshi Harasawa, Makoto Honda, Shigeto Akutsu
  • Patent number: 7961878
    Abstract: This specification describes technologies relating to imparting cryptographic information in network communications.
    Type: Grant
    Filed: October 15, 2007
    Date of Patent: June 14, 2011
    Assignee: Adobe Systems Incorporated
    Inventors: Asa Whillock, Edward Chan, Srinivas Manapragada, Matthew Kaufman, Pritham Shetty, Michael Thornburgh
  • Patent number: 7925890
    Abstract: A method is provided for re-initializing a cryptographic processing module (102) at a location designated as an unclassified environment. The method includes storing in a database (122) a module unique recovery vector (310, 510) assigned to a cryptographic processing module. The method also includes indexing the module unique recovery vector in the database using a unique module identifying code (for example, a serial number) assigned to the cryptographic processing module. The method further includes subsequently communicating the module unique recovery vector from the database, over a computer network (120), to a remote computing environment (400) that is unclassified. The module unique recovery vector is used to re-initialize the cryptographic processing module.
    Type: Grant
    Filed: October 23, 2006
    Date of Patent: April 12, 2011
    Assignee: Harris Corporation
    Inventors: Donald J. Dever, Ian D. Mann
  • Patent number: 7926100
    Abstract: A method for preventing unauthorized connection in a network system mainly includes adding an authentication key in the LLDP (link layer discovery protocol) transmitted in accordance with the 802.1ab communication protocol so as to proceed with security mechanism under the structure of 802.1ab communication protocol. The method for preventing unauthorized connection includes receiving a LLDP packet satisfying the 802.1ab communication protocol transmitted from a second network device by a first network device in a network system; analyzing the LLDP packet and checking whether the LLDP packet contains a legitimate authentication key; and if the authentication key does not exist or is illegitimate, then block all packets transmitted from the second network device so as to prevent the unauthorized second network device from using the network transmission service provided by the first network device.
    Type: Grant
    Filed: May 11, 2007
    Date of Patent: April 12, 2011
    Assignee: Cameo Communications Inc.
    Inventors: Shih Ching Lee, Pei Chuan Liu
  • Patent number: 7920705
    Abstract: A communication system comprises a covert channel detector. The covert channel detector can be used in a multi-level security system (MLS) or multiple single levels of security (MSLS). The covert channel detector detects covert channels in a cryptographic system. The cryptographic system can be used in a military radio system.
    Type: Grant
    Filed: July 26, 2006
    Date of Patent: April 5, 2011
    Assignee: Rockwell Collins, Inc.
    Inventor: Reginald D. Bean
  • Publication number: 20110075682
    Abstract: Embodiments of the invention are generally directed to messaging to provide data link integrity. An embodiment of a method includes transmitting a data stream over a data link from a first device to a second device, the data stream including multiple frames, the data stream being transmitted in a first mode. The method further includes determining a data transmission mode change from the first mode to a second mode for the transmission of the data stream from the first device to the second device, generating mode packets, each mode packet including fields to define a plurality of mode elements, the fields of the mode packet being set to indicate the data transmission mode change, and transmitting the mode packets to the second device prior to implementing the data transmission mode change.
    Type: Application
    Filed: September 30, 2009
    Publication date: March 31, 2011
    Inventor: William Conrad Altmann
  • Patent number: 7913089
    Abstract: An ID creating apparatus includes a derivative value creating unit for creating a derivative value, a user ID encrypting unit for creating encrypted ID by encrypting information including the user ID and the derivative value based on an encryption key, and a derivative ID creating unit for creating derivative ID based on the encrypted ID. An ID resolving apparatus includes an encrypted ID extracting unit for extracting the encrypted ID included in the derivative ID, an encrypted ID decrypting unit for decrypting the encrypted ID based on a decryption key corresponding to the encryption key and thereby creating decrypted ID, and an ID judging unit for determining that the derivative ID is created from the user ID when part of the decrypted ID coincides with information created based on the user ID.
    Type: Grant
    Filed: December 17, 2003
    Date of Patent: March 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Yuji Watanabe, Yoshinori Aoki, Masayuki Numao
  • Patent number: 7912215
    Abstract: A data transmitting apparatus generates, by using predetermined first key information and information data, a multi-level signal in which a signal level changes so as to be approximately random numbers, and converts the multi-level signal into a modulated signal, in a predetermined modulation method and transfer the same. A data receiving apparatus demodulates the modulated signal so as to be converted into a multi-level signal, and reproduces information data from the multi-level signal, using second key information which has the same content as first key information used by the data transmitting apparatus.
    Type: Grant
    Filed: January 22, 2007
    Date of Patent: March 22, 2011
    Assignee: Panasonic Corporation
    Inventors: Satoshi Furusawa, Masaru Fuse, Tsuyoshi Ikushima, Tomokazu Sada
  • Patent number: 7903813
    Abstract: A system for encrypting and decrypting data formed of a number of bytes using the ARCFOUR encryption algorithm is disclosed. The system includes a system bus and an encryption accelerator arranged to execute the encryption algorithm coupled to the system bus. A system memory coupled to the system bus arranged to store a secret key array associated with the data and a central processing unit coupled to the system bus wherein encryption accelerator uses substantially no central processing unit resources to execute the encryption algorithm.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: March 8, 2011
    Assignee: Broadcom Corporation
    Inventor: Donald E. Duval
  • Patent number: 7889861
    Abstract: A method for reducing the memory requirements of executing ciphering processes is disclosed which utilizes sequential key extraction and ciphering. By providing a base key for extracting therefrom multiple first sequential security keys; each key is sequentially extracted and employed. During the process overwriting of each sequential security key occurs with the next subsequently extracted sequential security key. In this manner memory requirements are lowered, power consumption reduced which are important in mobile applications.
    Type: Grant
    Filed: September 13, 2007
    Date of Patent: February 15, 2011
    Inventor: Michael Borza
  • Patent number: 7886151
    Abstract: A protocol for temporal synchronization of media signals with temporal components is used for digital watermarking and other applications. The synchronization protocol achieves initial synchronization by finding an initial synchronization key through analysis of a temporal media signal stream. It then uses features of the stream and a queue of one or more keys from previous frames to derive subsequent keys to maintain synchronization. If synchronization is lost due to channel errors or attacks, for example, the protocol uses the initial synchronization key to re-establish synchronization. In digital watermarking applications, the synchronization protocol is agnostic to the watermark embedding and reading functions.
    Type: Grant
    Filed: January 21, 2003
    Date of Patent: February 8, 2011
    Assignee: Purdue Research Foundation
    Inventors: Edward J. Delp, Eugene T. Lin
  • Patent number: 7882208
    Abstract: An information management apparatus includes a management unit for managing the type of integrated circuit chip and the type of command to be executed by the integrated circuit chip in such a manner as to correspond to each other; an information obtaining unit for obtaining information on the type of the integrated circuit chip to be controlled; and a command generation unit for generating a command of the type corresponding to the type of the integrated circuit chip to be controlled, the type of the integrated circuit chip being obtained by the information obtaining unit, from among a plurality of different types of commands corresponding to the command requested from a server and for transmitting the generated command to the server.
    Type: Grant
    Filed: September 22, 2005
    Date of Patent: February 1, 2011
    Assignee: Felica Networks, Inc.
    Inventors: Hideki Akashika, Jun Ogishima, Naofumi Hanaki