Class / Patent application number | Description | Number of patent applications / Date published |
380036000 | Time segment interchange | 21 |
20090323936 | SYSTEM, METHOD, AND SERVICE FOR PERFORMING UNIFIED BROADCAST ENCRYPTION AND TRAITOR TRACING FOR DIGITAL CONTENT - A unified broadcast encryption system divides a media key tree into S subtrees, divides digital content into segments, and converts some of the segments into variations; the number of segments and variations is q. The system subdivides each of the subtrees into q/|S| subdivided subtrees, assigns a key media variant to each of the subdivided subtrees, and generates a unified media key block (MKB | 12-31-2009 |
20090323937 | MULTI-LEVEL DATA ENCRYPTION AND DECRYPTION SYSTEM AND METHOD THEREOF - A multi-level data encryption and decryption system and a method thereof are provided. The method includes dividing a data into a plurality of sub-data blocks corresponding to a plurality of user levels. The method also includes generating an encryption key for each level according to a level generation key and a time key of the level and encrypting the sub-data block of each level by using the encryption key of the level, wherein the level generation key and the time key of a lower level are generated based on the same of an upper level, the time key is generated according to a time generation key and a time seed, and the time seed is periodically updated according to different encryption periods. Thereby, the number of keys to be managed by a user is reduced while the read rights of different users are managed with forward and backward data security. | 12-31-2009 |
380037000 | Block/data stream enciphering | 19 |
20080317246 | Device for and a Method of Processing Data Stream | 12-25-2008 |
20090080648 | CONTROLLED CRYPTOPERIOD TIMING TO REDUCE DECODER PROCESSING LOAD - Systems and methods are disclosed for enabling encryptor devices to provide real-time messages having offset cryptoperiods according to an offset algorithm within common crypto-sync pulse boundaries. A master clock aligns the encryptor devices to a common crypto-sync pulse. Subsequently, a cryptoperiod offset aligner assigns a different offset value according to an algorithm to each encrypted service. The corresponding encryptor device then begins the cryptoperiod, during which real-time messages are transmitted, at the assigned offset value from the common crypto-sync pulse. | 03-26-2009 |
20090257583 | CIPHER FEEDBACK WITH VARIABLE BLOCK CHAINING - Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a current initialization vector (IV) is generated based on a previous block of plaintext enciphered. Then a current block of plaintext is combined with the current IV to create a temporary block. An encipher may encipher the temporary block to generate a current block of ciphertext. | 10-15-2009 |
20090279697 | CIPHERTEXT KEY CHAINING - Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a current key is generated from a prior ciphertext block and another key, which may include a prior key used to encipher the prior ciphertext block or an initialization vector. Then a current plaintext block is enciphered using the current key to generate a current ciphertext block. | 11-12-2009 |
20100067687 | METHOD AND APPARATUS FOR MAINTAINING DATA INTEGRITY FOR BLOCK-ENCRYPTION ALGORITHMS - A method is disclosed for modifying an iterated block cipher by controlling the operations and transformations that cause diffusion. In one embodiment which is applicable to any iterated block cipher ( | 03-18-2010 |
20100091985 | SYSTEM AND METHOD FOR USING A STREAMING PROTOCOL - An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream. | 04-15-2010 |
20100111297 | FORMAT-PRESERVING CRYPTOGRAPHIC SYSTEMS - Format-preserving encryption and decryption processes are provided. The encryption and decryption processes may use a block cipher. A string that is to be encrypted or decrypted may be converted to a unique binary value. The block cipher may operate on the binary value. If the output of the block cipher that is produced is not representative of a string that is in the same format as the original string, the block cipher may be applied again. The block cipher may be repeatedly applied in this way during format-preserving encryption operations and during format-preserving decryption operations until a format-compliant output is produced. Selective access may be provided to portions of a string that have been encrypted using format-preserving encryption. | 05-06-2010 |
20100111298 | BLOCK CIPHER DECRYPTION APPARATUS AND METHOD - An apparatus and method obtains cipher block chaining mode (CBC) ciphertext blocks that were encrypted using a cipher block chaining encryption method, such a audio or video, and decrypts the CBC ciphertext blocks that were encrypted using the cipher block chaining encryption method using a multistage counter mode (CTR) decryptor to produce blocks of plaintext data from the CBC ciphertext blocks. In one example, cipher block chaining mode (CBC) information is translated (e.g., rearranged) to random counter mode (CTR) information so that a multistage counter mode (CTR) decryptor decrypts CBC ciphertext blocks into corresponding decrypted CBC plaintext blocks, in a parallel fashion, based on the translated CBC information. As such, apparatus with CTR hardware can be used to decrypt CBC or CFB ciphertext blocks. | 05-06-2010 |
20100158243 | METHOD OF ENCRYPTION IN NETWORKED EMBEDDED SYSTEMS - A data encryption method includes providing a sender node having information to transmit. The information is divided into a sequence of frames. A respective one of a plurality of frame numbers is assigned to each of the frames. At least one nonce and at least one security key are used to perform block cipher encryption and produce within the sender node a respective block cipher encryption output for each of the frames. The information is converted from a sequence of plaintext frames to a sequence of ciphertext frames by use of the block cipher encryption outputs produced within the sender node. The converting is performed within the sender node and after the block cipher encryption outputs have been produced within the sender node. A receiver node is used to ascertain the frame numbers. The at least one nonce is transmitted from the sender node to the receiver node. The at least one nonce and the at least one security key are used to perform block cipher encryption and produce within the receiver node a respective block cipher encryption output for each of the frames. The ciphertext frames are transmitted from the sender node to the receiver node. The ciphertext frames are transmitted after the block cipher encryption outputs have been produced within the receiver node. The transmitted ciphertext is converted back into the plaintext frames by use of the block cipher encryption outputs produced within the receiver node. The converting is performed within the receiver node and after the block cipher encryption outputs have been produced within the receiver node. | 06-24-2010 |
20100158244 | COMMUNICATION ENCRYPTION METHOD FOR SUPPORTING REMOTE MONITORING AND CONTROL SYSTEM - A communication encryption method for supporting a remote monitoring and control system includes establishing a communication network between a server and a remote host, encrypting a data to be transmitted/received, and testing terminal equipment connected to the remote host. The method includes the steps. The server sequentially partitions a test data, and performs a compression program and an encryption program to produce a plurality of first partitioned data, a compressed data, and a plurality of encrypted data respectively; next, the server transmits the encrypted data to the remote host; the remote host performs a decryption program sequentially to restore the encrypted data into the second partitioned data, then combines the second partitioned data into the compressed data, and performs a decompression program on the compressed data to restore the data into the first partitioned data, then recombines the first partitioned data to restore the data into the test data. | 06-24-2010 |
20100220854 | DATA SECURITY SYSTEM - A data security system that includes a first memory device to store message data to be secured, a second memory device to store microcode including an instruction set defining a cryptographic algorithm for use in securing the message data, and a processing unit to execute the microcode to implement the cryptographic algorithm. | 09-02-2010 |
20100329451 | Cipher Implementation - At least one of a keystream and a message authentication code are generated with a partial KASUMI block cipher, without utilizing a full KASUMI block cipher. | 12-30-2010 |
20110002460 | HIGH-SPEED CRYPTOGRAPHIC SYSTEM USING CHAOTIC SEQUENCES - A cryptographic system ( | 01-06-2011 |
20110091035 | HARDWARE KASUMI CYPHER WITH HYBRID SOFTWARE INTERFACE - A system including a memory; a software interface, operatively connected to the memory, and configured to generate a modified version of a confidentially key (CKey), and a modified version of an integrity key (IKey); and a Kasumi engine having a hardware implementation of a Kasumi cipher and configured to load the modified version of the CKey from the memory to perform a confidentiality function, and to load the modified version of the IKey from memory to perform an integrity function. | 04-21-2011 |
20110268268 | APPARATUS, METHOD, AND SYSTEM FOR DIGITAL CONTENT AND ACCESS PROTECTION - There is described a method for providing an audio signal to a user-end, comprising: modifying an amplitude of at least some bits of the audio signal using at least one user-specific series of bits, thereby obtaining a non-identical copy of the audio signal; transmitting the non-identical copy to the user-end; at the user-end, identifying the at least some bits within the non-identical copy; and restoring the amplitude of the at least some bits using the at least one user-specific series of bits, thereby reconstructing the audio signal. | 11-03-2011 |
20110280396 | System and Method for Dynamically Allocating Stream Identifiers in a Multi-Encryption Transport System - The present invention is suitable for use in a multi-encrypted system that dynamically allocates stream identifiers in a secondary overlay stream depending upon the identifiers in a primary encrypted stream. The primary encrypted input stream is monitored to determine the presence of all identifier values. Once the identifier values are determined, the values are stored in an allocation table and marked as ‘in-use’ to ensure that these identifier values are not allocated to any of the secondary overlay streams. The primary encrypted stream is monitored and the allocation table is updated continuously to detect any changes or conflicts to the identifier values, and the secondary overlay streams are dynamically updated accordingly. | 11-17-2011 |
20120250856 | Method And System For Encryption With Bidirectional Difference Propagation - An encryption method is disclosed, including two passes over a sequence of N input digital data X | 10-04-2012 |
20130064364 | SECURE DATA PARSER METHOD AND SYSTEM - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. | 03-14-2013 |
20190147065 | METHOD AND SYSTEM FOR VERIFICATION OF DELETED DATA FOR BLOCKCHAINS | 05-16-2019 |