Class / Patent application number | Description | Number of patent applications / Date published |
380260000 | Symmetric key synchronization | 36 |
20080247546 | METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENT STORED IN USB MASS STORAGE DEVICE USING TIME INFORMATION - Provided is a method of preventing digital content stored in a universal serial bus (USB) mass storage (UMS) device from being distributed without restriction. In the method, registration data is encrypted in order to allow a UMS device to decrypt and use digital content using time information only within a predetermined term of validity. Accordingly, even if encrypted registration data of a UMS device is disclosed, it is possible to make it difficult for unauthorized devices to store the registration data, thereby preventing content of the UMS device from being distributed without restriction. | 10-09-2008 |
20080304665 | Method and Device for Rights Management - A method of rights management in a first device connected to digital data content, said first device comprising a right for accessing said digital data content and available state information for reflecting the state of use of said digital data content, said method comprising the steps of: —receiving by said first device a request for a state information from a second device; —comparing the content of said request with said available state information; —selecting said requested state information in said available state information according to the result of said comparing step; —transferring said requested state information to said second device via a communication channel; and—duplicating said fight to said second device. | 12-11-2008 |
20090147958 | Dynamic, Selective Obfuscation of Information for Multi-Party Transmission - Selectively obfuscating, or obscuring, a portion or portions of information in a multi-party transmission. A user participating in a multi-party exchange signals a communication device (or proxy) that he will provide private information that is to be perceptible only to a subset of the other participants. This user also identifies that subset, preferably by providing a group identifier for a group in which that subset of participants are members. The communication device transmits a member-specific descriptor comprising an encrypted version of a group key, and uses this group key to encrypt the private information that is to be perceptible only to the subset. Device-specific characteristics of participant devices are used, in addition to user-provided data (such as a user's log-on identifier and/or password), as input to create cryptographic key information. Only participants in the subset can decrypt the encrypted private information; other participants preferably receive a filler pattern of some type instead. | 06-11-2009 |
20110091039 | RELEASING A SERVICE ON AN ELECTRONIC APPLIANCE - There is proposed a method for enabling a service made available by an electronic device ( | 04-21-2011 |
20110170692 | Method And System For Establishing Cryptographic Communications Between A Remote Device And A Medical Device - A method and system establishing cryptographic communications between a remote device and a medical device, with the medical device having less processing power than the remote device are disclosed. The method may comprise establishing unencrypted communication between the remote device and the medical device, generating an asymmetric key pair by the remote device comprising a public key and a private key, generating a key request message and sending of the key request message together with the public key to the medical device, generating a pre-master key and encryption of the pre-master key with the received public key by the medical device, generating a key response message and sending of the key response message together with the encrypted pre-master key from the medical device to the remote device, decrypting the encrypted pre-master key with the private key by the remote device, and deriving a master key as a symmetric key from the pre-master key. | 07-14-2011 |
20130010957 | CRYPTOGRAPHIC SECURITY USING FUZZY CREDENTIALS FOR DEVICE AND SERVER COMMUNICATIONS - An approach to cryptographic security uses a “fuzzy” credential, in contrast to a “hard” credential, to eliminate cryptographic algorithmic repeatability on a device that may be subject to physical attacks. By eliminating repeatability performed at an algorithmic (e.g., gate or software) level, a device inherently lacks one of the fundamental setup assumptions associated with certain classes of side channel, fault injection, timing, and related attacks, thus helps to protect the system against such attacks while preserving the cryptographic security of the system. | 01-10-2013 |
20130108045 | METHODS, NETWORKS AND NODES FOR DYNAMICALLY ESTABLISHING ENCRYPTED COMMUNICATIONS | 05-02-2013 |
20140247940 | NEAR FIELD REGISTRATION OF HOME SYSTEM AUDIO-VIDEO DEVICE - A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC interface and IR-transmits it to a home network server. Once the client is connected to the network, it encrypts its own device information with the key and sends the encrypted information to the server, which decrypts the data with the key sent from the remote commander. In this way, client device registration is executed easily and securely. | 09-04-2014 |
20150104014 | Automatic Multimedia Upload For Publishing Data And Multimedia Content - Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile device. In the absence of inbuilt BT capability, a BT communication device is provided on the digital data capture device. The BT communication device is paired with the BT enabled mobile device to establish a connection. The client application detects capture of data and multimedia content on the digital data capture device and initiates transfer of the captured data, multimedia content, and associated files. The digital data capture device transfers the captured data, multimedia content, and the associated files to the client application. The client application automatically publishes the transferred data and multimedia content on one or more websites. | 04-16-2015 |
20150104015 | Automatic Multimedia Upload For Publishing Data And Multimedia Content - Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile device. In the absence of inbuilt BT capability, a BT communication device is provided on the digital data capture device. The BT communication device is paired with the BT enabled mobile device to establish a connection. The client application detects capture of data and multimedia content on the digital data capture device and initiates transfer of the captured data, multimedia content, and associated files. The digital data capture device transfers the captured data, multimedia content, and the associated files to the client application. The client application automatically publishes the transferred data and multimedia content on one or more websites. | 04-16-2015 |
20150104016 | Automatic Multimedia Upload For Publishing Data And Multimedia Content - Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile device. In the absence of inbuilt BT capability, a BT communication device is provided on the digital data capture device. The BT communication device is paired with the BT enabled mobile device to establish a connection. The client application detects capture of data and multimedia content on the digital data capture device and initiates transfer of the captured data, multimedia content, and associated files. The digital data capture device transfers the captured data, multimedia content, and the associated files to the client application. The client application automatically publishes the transferred data and multimedia content on one or more websites. | 04-16-2015 |
20160006710 | DEVICE FOR SECURE PEER-TO-PEER COMMUNICATION FOR VOICE AND DATA - A cryptographic device for enabling encryption and decryption of data to be transferred between communication devices is provided. The cryptographic device comprises a first interface for connecting the cryptographic device to a communication device, wherein the first interface is adapted to transfer and receive data between the cryptographic device and the communication device; a safe memory storing one or more symmetric private keys for encrypting and decrypting data; an output module for outputting decrypted data; an input module for inputting unencrypted data; a microprocessor and a connection manager. | 01-07-2016 |
380262000 | Transmitting a seed, sequence, or initial value | 14 |
20090097652 | Quantum Computational Systems - Apparatus and methods for performing quantum computations are disclosed. Such quantum computational systems may include quantum computers, quantum cryptography systems, quantum information processing systems, quantum storage media, and special purpose quantum simulators. | 04-16-2009 |
20090220082 | Quantum Computational Systems - A computer-implemented method for encryption and decryption using a quantum computational model is disclosed. Such a method includes providing a model of a lattice having a system of non-abelian anyons disposed thereon. From the lattice model, a first quantum state associated with the lattice is determined. Movement of non-abelian anyons within the lattice is modeled to model formation of first and second quantum braids in the space-time of the lattice. The first quantum braid corresponds to first text. The second quantum braid corresponds to second text. A second quantum state associated with the lattice is determined from the lattice model after formation of the first and second quantum braids has been modeled. The second quantum state corresponds to second text that is different from the first text. | 09-03-2009 |
20100014671 | SECURE INTERCHIP TRANSPORT INTERFACE - Multimedia content or related data is securely transferred between a source device and a sink device in a secure multimedia content delivery device, such as a set-top box, using keys modified by logically combining them with copy control-related bits associated with the data. | 01-21-2010 |
20100034383 | SYSTEM AND METHOD FOR ENCRYPTING TRAFFIC ON A NETWORK - According to embodiments of the present invention a system and method for encrypting traffic on a network is disclosed. Encrypted data is transmitted between a first network element and a second network element by: acquiring an encryption seed at the first network element, the encryption seed being substantially similar to a decryption seed at the second network element; generating at least one encryption key from the encryption seed; receiving data; encrypting the data using the encryption key to generate encrypted data; transmitting the encrypted data from the first network element to the second network element via a network; and updating the encryption seed at the first network element in response to an event trigger | 02-11-2010 |
20100034384 | Method for providing a symmetric key for protecting a key management protocol - Cryptographic material is generated for a protocol for the encrypted transmission of media data between a subscriber device and a provider device. A first symmetric key of the subscriber device and the provider device is inserted in a symmetric key protection mechanism of a network protocol of a control layer to establish a communication session between the subscriber device and the provider device. A first time-variable parameter is transmitted from the provider device to the subscriber device. A second symmetric key for protecting the key management protocol is calculated by both the provider device and the subscriber device using a defined function depending at least on the first symmetric key and the first time-variable parameter. | 02-11-2010 |
20110280400 | CLOUD STORAGE SYSTEM AND METHOD - A cloud storage method includes: connecting a portable electronic device having a hardware identification code to a mediation device; generating a first verification serial number by a first serial number generating module of the portable electronic device via the hardware identification code and transmitting the first verification serial number to a cloud server via the mediation device and a network system connecting to the mediation device and the cloud server; generating a second verification serial number by a second serial number generating module of the cloud server having a storage module via a hardware identification code pre-stored in the storage module; and a comparison module built in the cloud server comparing the first and second verification serial numbers so as to process the storage module according to an operating signal sent by the user when the first and second verification serial numbers are determined to be the same. | 11-17-2011 |
20120082312 | METHOD OF AUTHENTICATION AND SESSION KEY AGREEMENT FOR SECURE DATA TRANSMISSION, A METHOD FOR SECURELY TRANSMITTING DATA, AND AN ELECTRONIC DATA TRANSMISSION SYSTEM - The invention relates to a method of authentication and session key agreement for secure data transmission between a first and second data communication entity in an electronic data transmission system. Furthermore, the invention relates to an electronic transmission system to perform a method of authentication and session key agreement. | 04-05-2012 |
20120140926 | METHOD FOR KEY UPDATE BASED ON THE AMOUNT OF COMMUNICATION IN WIRELESS SENSOR NETWORKS HAVING HIERARCHY STRUCTURE - The present invention relates to a key update method based on the amount of communication in wireless sensor networks having a hierarchy structure. | 06-07-2012 |
20120294443 | Establishing Secure Links Between Wireless Devices in Proximity Using Ambient Wireless Signals - Wireless devices in proximity are securely paired with one another autonomously by generating a common cryptographic key directly from a time-varying wireless environment shared among the wireless devices. The shared key can be used by the wireless devices to authenticate each wireless device's physical proximity and then to facilitate confidential communication between the wireless devices. The algorithm used to create the shared key is secure against a computationally unbounded adversary and its computational complexity is linear in the size of the shared key. | 11-22-2012 |
20120300930 | Single-Round Password-Based Key Exchange Protocols - A method for initializing encrypted communications using a common reference string and a shared password, includes determining a secret key of a peer using a first message, a second message and the common reference string, wherein the first message and the second message each comprise a tuple of elements of a cyclic group G of prime order p, a blinding encryption of the shared password, and a hash projection key. | 11-29-2012 |
20120300931 | Method and Apparatus for Securing Data in a Memory Device - A Method and a terminal intended for securing information in a local memory device which is couplable to a terminal having a data link interface. At the terminal, the method divides original data resulting in a first portion and a second portion. The method stores the first portion in the local memory device and sends the second portion for storage in a remote memory device. Upon obtaining an authorized read request targeted to the original data the method retrieves the second portion and combines the two portions. The method provides high data security if the data, is encrypted prior to the step of dividing. Another aspect of the invention comprises a terminal capable of at least combing the first and second data portions to reconstruct the original data, and preferably to perform the step required for dividing the data. The data may or may not be encrypted. | 11-29-2012 |
20130343541 | METHOD AND APPARATUS FOR SECURE COMMUNICATION AND DETERMINING SECRET INFORMATION - A method of secure communication in a transmitter, includes determining a method of generating a training sequence that is shared with a receiver. The method further includes generating the training sequence based on the method of generating the training sequence, and secret information. The method further includes communicating with the receiver based on channel information derived from the training sequence. | 12-26-2013 |
20150117645 | MEDICAL DEVICE COMMUNICATION USING ENCRYPTION BASED ON CORRELATED MOTION - Devices, systems, and techniques for generating an encryption key using detected motion from a device. In one example, a method may include receiving movement information indicative of motion detected by a first device during a period of time in which the first device and a second device were bumped together, determining a set of values that represent at least one characteristic of the movement information, and generating, based on the set of values, an encryption key for at least one of encrypting and decrypting data communicated between the first device and the second device. In some examples, the first device may include a sensor configured to detect each time the first device is bumped with the second device during the period of time. The first and second devices may be an implantable medical device and a programmer for the implantable medical device. | 04-30-2015 |
20160044030 | METHOD OF PROVIDING REAL-TIME SECURE COMMUNICATION BETWEEN END POINTS IN A NETWORK - A method of establishing a multiplicity of shared secrets at two mutually authenticated end points in a network. The method includes authenticating a first end point in the network based on an asymmetric key pair and authenticating a second end point based on an asymmetric key pair. Upon successful authentication of the first and second end points, the end points negotiate a shared secret. Multiple shared secret keys are generated from the negotiated shared secret and session keys are computed from the multiple shared secret keys. | 02-11-2016 |
380263000 | Nonlinear or chaotic system | 10 |
20080226072 | Range Measurement Apparatus and Method Using Chaotic Uwb Wireless Communication - Provided is a range measurement apparatus and method based on chaotic ultra wideband (UWB) wireless communication. The apparatus includes a chaotic signal generating/modulating unit for generating/modulating chaotic signals and outputting them to a transceiving unit; a transceiver for transceiving radio signals; a detector for detecting the radio signals in forms of voltage signals; a transformer for sampling the analog voltage signals and outputting first digital signals of a predetermined level; a comparator for comparing levels of the analog voltage signals with a threshold value and outputting second digital signals; and a range measurement unit for calculating a leading edge, which is a moment when initial data of a packet payload arrive, by using the binary signals from transformation of the first digital signals based on the threshold and the second digital signals, and performing range measurement based on the leading edge. This research is applied to chaotic UWB wireless communication. | 09-18-2008 |
20080240437 | Alternative Design for Quantum Cryptographic Entangling Probe - An alternative design is given for an optimized quantum cryptographic entangling probe for attacking the BB84 protocol of quantum key distribution. The initial state of the probe has a simpler analytical dependence on the set error rate to be induced by the probe than in the earlier design. The new device yields maximum information to the probe for a full range of induced error rates. As in the earlier design, the probe contains a single CNOT gate which produces the optimum entanglement between the BB84 signal states and the correlated probe states. | 10-02-2008 |
20080304666 | Spread Spectrum Communications System and Method Utilizing Chaotic Sequence - A method is provided for generating a coherent chaotic sequence spread spectrum communications system. The method includes phase modulating a carrier with information symbols. The method also includes generating a string of discrete time chaotic samples. The method further includes modulating the carrier in a chaotic manner using the string of discrete time chaotic samples. Each of the discrete time chaotic samples has a shorter sample time interval than the duration of the information symbols. The generating step includes selecting a plurality of polynomial equations. The generating step also includes using residue number system (RNS) arithmetic operations to respectively determine solutions for the polynomial equations. The solutions are iteratively computed and expressed as RNS residue values. The generating step further includes determining a series of digits in the weighted number system based on the RNS residue values. The method further includes synchronizing the chaos generated at the receiver with that generated at the transmitter without periodic transfer of state update information. | 12-11-2008 |
20090034727 | Chaotic Spread Spectrum Communications System Receiver - A method is provided for coherently demodulating a chaotic sequence spread spectrum signal at a receiver ( | 02-05-2009 |
20090196420 | CRYPTOGRAPHIC SYSTEM INCORPORATING A DIGITALLY GENERATED CHAOTIC NUMERICAL SEQUENCE - A cryptographic system (CS) is provided. The CS ( | 08-06-2009 |
20090285395 | SYSTEM AND METHOD FOR GENERATING ANALOG-DIGITAL MIXED CHAOTIC SIGNAL, ENCRYPTION COMMUNICATION METHOD THEREOF - A system and method for generating analog-digital mixed chaotic signal and an encryption communication method thereof are provided. In the system and method, the complementarity between continuous chaotic systems ( | 11-19-2009 |
20100074445 | Encryption/identification using array of resonators at transmitter and receiver - A sender and a receiver includes first and second arrays of coupled oscillators, respectively, that are substantially identically constructed so as to exhibit substantially the same dynamical response to excitation. A chaotic waveform generated at the sender is transmitted to the receiver, which generates a second chaotic waveform, and compares the received waveform with the generated second waveform. If the first and second waveforms match the sender is an authorized sender. An integrated circuit includes an array of coupled oscillators that in combination generate a waveform in response to at least one excitation signal. The array of coupled oscillators represents, in response to application of the excitation signals, a multi-dimensional security key that is shared between the sender of the waveform and the receiver of the waveform. | 03-25-2010 |
20100310072 | SYMBOL DURATION DITHERING FOR SECURED CHAOTIC COMMUNICATIONS - A system for communicating a sequence of information symbols using a chaotic sequence spread spectrum signal. The system includes a transmitter ( | 12-09-2010 |
20150365824 | SATELLITE BASED KEY AGREEMENT FOR AUTHENTICATION - A method for deducing a quantity (θ), in two distinct locations, from further distinct measurable quantities. The method comprises the steps of observing with a first device (CD) the quantity (θ) from an intercepted signal, whereby the device is placed in a location with first coordinates (X | 12-17-2015 |
20220140994 | COHERENT DETECTION-BASED HIGH-SPEED CHAOTIC SECURE TRANSMISSION METHOD - A coherent detection-based high-speed chaotic secure transmission method includes: at a transmit terminal in a chaotic secure transmission system, optically coupling an optical chaotic carrier and transmission information by using an orthogonal basis to mask the transmission information by using a noise-like feature of the chaotic carrier, so as to obtain a chaotic masked signal; adding a fast phase disturbance and a fast polarization disturbance to the chaotic masked signal and transmitting the chaotic masked signal over an optical fiber transmission link; and at a receive terminal, obtaining the chaotic masked signal through coherent detection, compensating the chaotic masked signal for linear and nonlinear effects through digital signal processing, and using a polarization orthogonal basis- or phase orthogonal basis-based chaotic decryption algorithm to separate the chaotic carrier from the signal so as to complete decryption. | 05-05-2022 |