摘要:
A method for synchronizing the scrambling sequences of communicating scrambler units of a privacy communications system in a reliable and secure manner. The method is particularly adapted for use in noisy or fade prone transmission environments, and permits late entry of authorized third parties to the system. The method utilizes digital sequences interleaved periodically with scrambled analog information to provide reliable synchronization.
摘要:
At a two-way communications apparatus (200) of choice, one can detect (101) a two-way communications apparatus user instruction and then, in response to detecting that instruction, provide (102) certain information to a nearby two-way communications apparatus (208) via a near field communications link (206). This information can comprise, at least in part, a biometric template as pertains to a user of the two-way communications apparatus and a privacy policy as pertains to further dissemination of the biometric template.
摘要:
New devices (101) are added to an existing domain by obtaining domain information (e.g., domain name and private domain password) from devices (101) already in the domain that preferably are in close proximity. Once the domain information has been transferred from the device already in the domain to the device being added to the domain, the device being added to the domain contacts a key issuer (105) to complete its registration into the domain. The key issuer returns a DRM domain private key (206) as well as a DRM certificate (202). Both are utilized by the device to obtain and render digital content (204).
摘要:
Disclosed is a method, system and apparatus for transferring protected data having an authorizing entity's outer encryption layer and having a user-fixed inner encryption layer from a first electronic device having a first unique, unalterable identifier to a second electronic device having a second unique, unalterable identifier. A central unit includes a receiver configured to receive from the first electronic device protected data having an authorizing entity's first outer encryption layer corresponding to the first unique, unalterable identifier and having a user-fixed inner encryption layer; a processor configured to decrypt the authorizing entity's first outer encryption layer of the protected data; a processor configured to encrypt an authorizing entity's second outer encryption layer of the protected data corresponding to the second unique, unalterable identifier; and a transmitter configured to transmit protected data to the second electronic device.
摘要:
At a two-way communications apparatus (200) of choice, one can detect (101) a two-way communications apparatus user instruction and then, in response to detecting that instruction, provide (102) certain information to a nearby two-way communications apparatus (208) via a near field communications link (206). This information can comprise, at least in part, a biometric template as pertains to a user of the two-way communications apparatus and a privacy policy as pertains to further dissemination of the biometric template.
摘要:
A vehicle authenticates a first prospective component by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key unique to the first prospective component and determining whether the first prospective component is the authentic component based on whether the cryptographic key is successfully utilized in cryptographic communication with the first prospective component. The vehicle authenticates a component class of a second prospective component by obtaining from a certification authority a certification that an authentic component of the component class is associated with a second cryptographic key unique to the component class and determining whether the second prospective component is an authentic component of the component class based on whether the second cryptographic key is successfully utilized in the cryptographic communication with the second prospective component.
摘要:
A vehicle authenticates a prospective component for use in the vehicle by obtaining from a certification authority a certification that an authentic component is associated with a cryptographic key. The certification certifies that the cryptographic key is bound to information identifying the authentic component. The vehicle utilizes the cryptographic key obtained from the certification authority in cryptographic communication with the prospective component, and determines whether the prospective component is the authentic component based on whether the cryptographic key is successfully utilized in the cryptographic communication.
摘要:
An apparatus and method for preventing information leakage attacks on a microelectronic assembly is described for performing a cryptographic algorithm by transforming a first function, used by the cryptographic algorithm, into a second function. The method includes receiving (1102) a masked input data having n number of bits that is masked with an input mask, wherein n is a first predetermined integer. The method also includes processing (1104) the masked input data using a second function based on a predetermined masking scheme, and producing (1106) a masked output data having m number of bits that is masked with an output mask, wherein m is a second predetermined integer.
摘要:
A key management system includes a hierarchy (10) of independent key arbitration centers (KAC) for providing access to a user's session keys through key management centers (KMC). When a court order is issued for a user's session keys, a message requesting the keys is transferred down through hierarchy until a terminal KAC (16,36) is reached. Each KAC in the hierarchy adds its ID and signs (116) the message, verifying prior signatures (114). The user's ID is encrypted with the terminal KAC's public key. The terminal KAC engages in a blind key access procedure (129) with the KMC (18,38) to receive the user's session key. The key is provided encrypted with the requesting party's or agency's public key. Accordingly, privacy is assured because only the KMC and the requesting agency have access to the actual key value, and only the terminal KAC and requesting agency have access to the user's ID. No other KACs in the hierarchy have access to the user ID or key value, and the KMC does not know which user's key has been provided.
摘要:
Blind access (100, 300, 400) to a desired encryption key of a predetermined first group member is provided to a second group. The first group encrypts a plurality of first group member encryption keys using a predetermined algorithm and transfers to the second group, the encrypted plurality of first group member encryption keys with corresponding unencrypted first group member identification fields, IDs, and a list of IDs corresponding to the first group members. The desired ID-free encryption key is selected and encrypted by the second group using a predetermined algorithm. The doubly encrypted key is transferred to the first group, decrypted by the first group and transferred to the second group for decryption. Thus, the encryption key is provided without knowledge to the first group of which member's encryption key is being examined and with knowledge to the second group of only the desired encryption key.