Patent application number | Description | Published |
20080313458 | SYSTEM AND METHOD OF PER-PACKET KEYING - A method of per-packet keying for encrypting and decrypting data transferred between two or more parties, each party having knowledge of a shared key that allows a per-packet key to differ for each packet is provided. Avoiding the use of a static session key during encryption offers several advantages over existing encryption methods. For example, rejecting packets received with duplicate sequence numbers, or sequence numbers that are beyond a specified deviation range mitigates Replay Attacks. | 12-18-2008 |
20080313464 | SYSTEM AND METHOD OF CREATING AND SENDING BROADCAST AND MULTICAST DATA - A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding the transfer of the key offers several advantages over existing encryption methods. | 12-18-2008 |
20090122984 | SECURE MOBILE TELEPHONY - An system for and method of providing end-to-end encrypted real-time phone calls using a commodity mobile phone and without requiring service provider cooperation is presented. The system and method improve upon prior art techniques by omitting any requirement for mobile phones that are specially manufactured to include end-to-end encryption functionality. | 05-14-2009 |
20090169013 | SYSTEM FOR AND METHOD OF CRYPTOGRAPHIC PROVISIONING - A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer. | 07-02-2009 |
20090172412 | SYSTEM FOR AND METHOD OF AUTO-REGISTRATION WITH CRYPTOGRAPHIC MODULES - A system for and method of registering devices an applications with cryptographic modules is presented. The system and method prevent devices and applications from operating in conjunction with cryptographic modules unless such devices and applications have previously been registered with the module. | 07-02-2009 |
20090204393 | Systems and Methods For Adaptive Multi-Rate Protocol Enhancement - A method of processing a codec sample is provided. The method includes: removing from a first portion of the codec sample, a first number of first information bits. The first information bits are indicative of frame information associated with the codec sample. The method also includes inserting at the first portion of the codec sample from a second portion of the codec sample, a second number of data bits. The first number of the first information bits is greater than or equal to the second number of the data bits. The method also includes removing the second portion of the codec sample. The method may also include encrypting and decrypting the codec sample. In some embodiments, the codec sample is an adaptive multi-rate codec sample. In some embodiments, the adaptive multi-rate codec sample is a 5.15 mode adaptive multi-rate codec sample. | 08-13-2009 |
20090268902 | SYSTEM FOR AND METHOD OF CRYPTOGRAPHIC PROVISIONING - A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer. | 10-29-2009 |
20100031063 | System for and Method of Remote Secure Backup - Systems and methods for registering a module for backup, backing up a module, and restoring a backed up module are provided. | 02-04-2010 |
20110044453 | SYSTEM AND METHOD OF ENCRYPTED MEDIA ENCAPSULATION - A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and compressing, via a codec, the plurality of packets of data. The method may also include queuing the plurality of packets of data in a queue and encrypting, via a filter, payloads of at least two of the plurality of packets of data in the queue into a single payload. The method further include transmitting the single payload in a single encrypted data packet. | 02-24-2011 |
20110138170 | SYSTEM AND METHOD OF PER-PACKET KEYING - A method of per-packet keying for encrypting and decrypting data transferred between two or more parties, each party having knowledge of a shared key that allows a per-packet key to differ for each packet is provided. Avoiding the use of a static session key during encryption offers several advantages over existing encryption methods. For example, rejecting packets received with duplicate sequence numbers, or sequence numbers that are beyond a specified deviation range mitigates Replay Attacks. | 06-09-2011 |
20110194695 | System And Method Of Creating And Sending Broadcast And Multicast Data - A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding the transfer of the key offers several advantages over existing encryption methods. | 08-11-2011 |
20130121491 | SYSTEM AND METHOD OF CREATING AND SENDING BROADCAST AND MULTICAST DATA - A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding the transfer of the key offers several advantages over existing encryption methods. | 05-16-2013 |
20130282904 | SYSTEMS AND METHODS FOR ENABLING SECURE MESSAGING, COMMAND, AND CONTROL OF REMOTE DEVICES, COMMUNICATED VIA A SHORT MESSAGE SERVICE OR OTHER MESSAGE ORIENTED COMMUNICATIONS MEDIUMS - Given the rise in popularity of communicating personal, private, sensitive, or vital peer-to-peer or peer-to-group information over potentially insecure text messaging infrastructure, it would be desirable to provide a solution that enables the exchange of this type of information securely over at least one path via data and/or voice networks. Furthermore, it would be highly desirable to enable access to the secure exchange of information over the at least one path by a given entity, as well as other computer applications that the given entity may use. | 10-24-2013 |
20130346750 | SYSTEM AND METHOD TO PROVIDE SECURE MULTIMEDIA MESSAGING BETWEEN PEER SYSTEMS - A lightweight solution enables the exchange of multimedia information in a secure manner. Exchanged cryptographic material can be used to encipher multimedia message-oriented communications between devices. This lightweight solution can be used by common off the shelf devices such as smartphones, tablets, feature phones, or special purpose machine to machine devices for private communications, such as command and control, location services, video, audio, electronic attachments, etc. using insecure voice or data communication paths, such as MMS. | 12-26-2013 |
20140025952 | HIDING CIPHERTEXT USING A LINGUISTICS ALGORITHM WITH DICTIONARIES - Encrypted communications is made to appear to be normal text so as to avoid undue attention to either the sender or recipient. Information can be hidden or embedded in innocuous documents using steganography wherein the information is masked within a larger document. Other approaches would translate the ciphertext into a form of normal looking text that would in effect be gibberish but would use normal words in at least one native language. There are many tradeoffs and benefits to be considered when attempting any form of encrypted communications. | 01-23-2014 |
20140357295 | GEOSPATIAL ASSET TRACKING SYSTEMS, METHODS AND APPARATUS FOR ACQUIRING, MANIPULATING AND PRESENTING TELEMATIC METADATA - A convenient, easy to use ubiquitous governance system to help manage and maintain the plurality of semi-autonomous devices that will be loosely coupled to and communicate via the Internet or other network, more commonly referred to as the network of things. | 12-04-2014 |