Abstract:
The present disclosure provides systems and methods for accessing secure and certified electronic messages using a combination of biometric security, a separate and secure network and email infrastructure, email management processes, and the addition of text, audio and visual format options to sending emails messages. In an exemplary embodiment, a secure message and file delivery method includes biometrically authenticating a sender of an electronic message; receiving the electronic message through a secure connection to the sender; storing the electronic message, wherein the electronic message is encrypted prior to storing; notifying a recipient of the electronic message; and delivering the electronic message through a secure connection to the recipient.
Abstract:
A communication system (100) including a group management processor (144) operable to divide an enlarged group of user terminals formed by patching of smaller groups into sub-sets of user terminals including: (1) an encrypted sub-set of terminals (103, 113, 123) which are operable to undertake only encrypted communications; and (2) a selectable-clear sub-set of terminals (105, 115, 125) which includes: (i) selectable terminals that are able to undertake clear communications and, when selected, encrypted communications; and (ii) clear terminals that are operable to undertake only clear communications; and a translator (143) operable to translate a communication sent in a first encrypted form from a user terminal (103) of one of the sub-sets into the second encrypted form suitable for decryption by user terminals (105, 115) of the other sub-set. Also described is a method (300) and a processor (144) for use in the system.
Abstract:
A method and system for distributing data to at least one communication device are disclosed. When multiple communication devices request the same data, a seeder sends a different piece of the data to each communication device and the communication devices share the piece of data each other by using a wireless connection established between them. The communication devices automatically suspend and resume downloading of the piece of the data from other communication devices as the communication device performs a handover. The receiver may be given super-distribution rights. When a destination communication device requests data, a content provider identifies a source communication device which possesses the same data and has the source communication device to forward the data to the destination communication device. The source communication device re-encrypts the data with a new encryption key and the destination communication device obtains a license from a rights issuer to decrypt the data.
Abstract:
In einem Multihop-Netzwerk werden Pakete zum verschlüsselten Versand in Header und Nutzdaten unterteilt. Die Header-Informationen, speziell die Multihop-Informationen werden getrennt von den Nutzdaten verschlüsselt, damit jeder Netzwerk-Knoten zur Weiterleitung eines Pakets nur den Header entschlüsseln muss. Zur getrennten Verschlüsselung werden dabei der Header und die Nutzdaten unabhängig voneinander derart an die Hardware des jeweiligen Geräts zur Verschlüsselung geleitet, als ob sie jeweils vollständige Pakete wären. Dadurch wird eine hardwarebeschleunigte Verschlüsselung von Header und Nutzdaten mit verschiedenen Schlüsseln ermöglicht. Weiterhin erhält der Header hierdurch einen Integritätsschutz.
Abstract:
Protecting elementary stream media content is described. In one aspect, data segments within elementary stream media content are identified. Each data segment includes a single video or audio frame. Encryption boundaries for protecting the payload packets are selected to correspond to data segment boundaries. The elementary stream media content is then protected using the selected encryption boundaries.
Abstract:
A method of processing data packets in a data network. The method includes receiving an encrypted data packet at a packet switch (610). The packet switch determines a packet-processing device for decrypting the encrypted data packet (615) and communicates the encrypted data packet to the first packet-processing device (620). The first packet-processing device decrypts the encrypted data packet a clear data packet (625). The packet-processing device then communicates the clear data back to the packet switch for continued processing (630).
Abstract:
A secure digital content delivery system includes a content provider and a content user. The content provider delivers encrypted content to the content user in response to delivery requests. The content provider generates encryption algorithms on the fly and encrypts the content prior to delivery, optionally using a different encryption algorithm and key for each content delivery. The content user subsequently requests access permission from the content provider, to access the encrypted content. The content provider grants access by generating an executable decryption module on the fly and providing the executable decryption module to the content user. The content user decrypts the content and accesses it on the fly, using the executable decryption module. The accessed content is then re-encrypted using a different encryption algorithm and key, to preserve the integrity of the secure content delivery system.
Abstract:
A method and device are described for conducting a transaction between electronic devices in which transaction data is exchanged over an infrared frequency. A first and second electronic device, with a common encryption algorithm deployed on each device, establish an infrared communications link. The second electronic device transmits a transaction request together with an encryption key to the first electronic device. The first electronic device returns response data to the second electronic device which response data is encrypted using the common encryption algorithm and the encryption key. An account to be utilized in the transaction is derived from the response data allowing the transaction to be completed.
Abstract:
A real-time communication architecture establishes a continuous connection (25) between an enterprise network (18) and a communication management system (16). The connection (25) is continuously held open allowing mobile devices (21) real-time access to enterprise email systems (34). The real-time communication architecture can support an entire enterprise email system or individual email users (64). The foregoing and other objects, features and advantages of the invention will become more readily apparent from the following detailed description of a preferred embodiment of the invention which proceeds with reference to the accompanying drawings.
Abstract:
Encryption is provided in wireless personal palm type computer devices for Internet transmitted documents despite the limited data processing and memory functions in such devices. The palm type device initially encrypts only a portion of a text document which is then wirelessly transmitted to the server computer which normally functions as the Web server, i.e. the server through which Web computer terminals are wired or connected into the Web. This Web server then further encrypts the received text document and then further transmits this further encrypted document to a terminal in said network. Preferably, the further encryption in the server involves two steps: decrypting the lower level encryption (necessitated by the limited CPU and memory resources in the palm device) to restore the text document at the server before the server may then re-encrypt the whole document using a higher level conventional 128 bit Web encryption protocols such as SSL.