Patent application number | Description | Published |
20080229109 | HUMAN-RECOGNIZABLE CRYPTOGRAPHIC KEYS - A visual authentication scheme for websites is provided that binds an image to a website so that a user can by visually authenticate whether he/she is viewing an intended/trusted website. An authentication or cryptographic key (associated with a web page) is rendered as a unique key-identifying image or unique sequence of images. This key-identifying image(s) is then displayed to the user. The user associates this key-identifying image with the originator or source of the web page so that the user can easily recognize the originator by glancing at the key-identifying image. The association between the key-identifying image and the cryptographic/authentication key (and thereby the source of the web page) can be achieved similarly to brand awareness. | 09-18-2008 |
20100002870 | PARTIAL ENCRYPTION AND FULL AUTHENTICATION OF MESSAGE BLOCKS - Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Masking modules ( | 01-07-2010 |
20100034385 | COMBINATIONAL COMBINER CRYPTOGRAPHIC METHOD AND APPARATUS - Another feature provides an efficient encryption method that safeguards the security of encrypted symbols. Each plaintext symbol is encrypted by using a separate pseudorandomly selected translation table. Rather than pre-storing every possible permutation of symbols as translation tables, the translation tables may be efficiently generated on-the-fly based on a pseudorandom number arid a symbol shuffling algorithm. A receiving device may similarly generate reverse translation tables on-the-fly to decrypt received encrypted symbols. | 02-11-2010 |
20100318162 | THERMAL TREATMENT SYSTEM UTILIZING CONSTRUCTIVELY INTERFERING ELECTROMAGNETIC RADIATION - Methods and systems enable thermal treating a portion of a subject using microwave or other electromagnetic radiation without harming other portions of the subject. In an embodiment, a plurality of electromagnetic radiation transmitters are positioned within a thermal treatment system and coupled to a control processor. The electromagnetic radiation may be transmitted as a pseudorandom waveform and maybe microwave radiation. The control processor coordinates the transmitters so that emitted electromagnetic radiation constructively interferes within a treatment volume while radiation passing through the rest of the subject randomly interferes or appears as noise. As a result, in a volume in which the electromagnetic radiation waveforms arrive in phase the power of all the transmitters add constructively resulting in a significant temperature rise, while the rest of the subject is exposed to a much lower average power level and thus a lower temperature rise. | 12-16-2010 |
20110238972 | Secure Bootstrapping for Wireless Communications - A mutual authentication method is provided for securely agreeing application-security keys with mobile terminals supporting legacy Subscriber Identity Modules (e.g., GSM SIM and CDMA2000 R-UIM, which do not support 3G AKA mechanisms). A challenge-response key exchange is implemented between a bootstrapping server function (BSF) and mobile terminal (MT). The BSF generates an authentication challenge and sends it to the MT under a server-authenticated public key mechanism. The MT receives the challenge and determines whether it originates from the BSF based on a bootstrapping server certificate. The MT formulates a response to the authentication challenge based on keys derived from the authentication challenge and a pre-shared secret key. The BSF receives the authentication response and verifies whether it originates from the MT. Once verified, the BSF and MT independently calculate an application security key that the BSF sends to a requesting network application function to establish secure communications with the MT. | 09-29-2011 |
20120069992 | Product Authentication Using End-To-End Cryptographic Scheme - A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured codes is generated between inner items (e.g., pharmaceutical doses such as pills, capsules, tablets) and outer items (e.g., packaging containing inner items). For instance, an inner code associated with a first item is used to generate (at least partially) an outer code associated with a second item that contains one or more first items. This process may be repeated multiple times with codes for outer items being a function of codes for inner items. The sequence of items may be authenticated by the dependent relationship between their codes. | 03-22-2012 |
20120207304 | METHOD AND APPARATUS FOR ENCRYPTING DATA IN A WIRELESS COMMUNICATION SYSTEM - In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation. | 08-16-2012 |
20120249341 | Communication of emergency messages with road markers - Disclosed is an apparatus, system, and method to communicate emergency messages utilizing road markers. The road marker may include: a light emitter to emit different light colors; a transmitter; and a receiver to receive an emergency message from an emergency vehicle, a road marker gateway, or another road marker. Further, the road marker may include a processor to: to command the light emitter to emit a light color based upon the emergency message received by the receiver; and command the transmitter to transmit the received emergency message to at least one other road marker. | 10-04-2012 |
20130117843 | Methods, Devices, And Systems For Detecting Return-Oriented Programming Exploits - Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences. | 05-09-2013 |
20130185214 | System and Method For Secure Offline Payment Transactions Using A Portable Computing Device - Disclosed is a system and method that provides a merchant associated with a point of sale (“POS”) system and a consumer associated with a portable computing device (“PCD”) to complete a purchase transaction without transmitting or presenting confidential payment credentials. In an exemplary embodiment, sound is used to transmit data between the POS and the PCD. A payment request is rendered on the PCD. The consumer reviews and authorizes via a unique cryptographic signature. The merchant approves via addition of its unique cryptographic signature. A remote service in communication with the POS verifies the signatures via previously registered public keys. The transaction is then settled to a consumer account. Confirmation is returned to the POS and PCD. Advantageously, the transaction is commenced and completed without the PCD being online. Further, the consumer payment credentials are not stored on the PCD or transmitted from the PCD to the merchant POS system. | 07-18-2013 |