Abstract:
The present invention is directed towards providing a partial dual-encrypted stream in a conditional access overlay system. The headend equipment includes an aligner, identifier, and remapper (AIR) device (615) that receives a clear stream and one or two encrypted streams, where the two encrypted streams have been encrypted by two different encryption schemes. The AIR device (615) identifies critical packets associated with the clear stream and subsequently allows two encrypted streams to pass and drops the critical packets of the clear stream. A multiplexer (640) then combines a percentage of the non-critical packets of the clear stream and the critical packets of the two encrypted streams to provide the partial dual-encrypted stream.
Abstract:
Systems and methods are provided for securing data for transmission to a wireless device. The systems and methods may include an electronic messaging system used to send and receive data over a first network and also used to forward data to a wireless device operable in a second network. The electronic messaging system may receive an electronic message encrypted with a first encryption algorithm and addressed to a message recipient in the first network, the message recipient having an associated wireless device operable in the second network. The electronic messaging system may determine that the electronic message is to be transported across the second network to the wireless device, and in response to determining that the electronic message is to be transported across the second network, encrypt the electronic message using a second encryption algorithm and transmit the encrypted message over the second network to the wireless device, with the second encryption algorithm being a stronger encryption algorithm than the first encryption algorithm.
Abstract:
Data messages (101) transmitted between computers are encrypted to provide a high level of security, yet the throughput of the encrypted data is minimally affected. In this regard, a first computer (14, 17) and a second computer (14, 17) utilize a new encryption key and/or encryption scheme for each data session between the two computers. Furthermore, in one embodiment, the first computer (14, 17) encrypts a data portion (103) of a message (101) via a first encryption technique before transmitting the message (101) to a second computer (14, 17). The first computer (14, 17) also includes information associated with the first encryption technique in a header (105) of the message (101) and encrypts the header (105) via a second encryption technique, which preferably is a highly secure encryption technique. The second computer (14, 17) receives the data message (101) and decrypts the header (105). The second computer (14, 17) then utilizes the information in the header (105) that is associated with the first encryption technique to decrypt the data portion (103).
Abstract:
The invention is directed to secure content delivery. A device (10) sends (4) a content request to a CP (14) identifying targeted content and a public key (K PUB) of the device. A response (8) identifies a Content Delivery Network (18-1, 18-2), CDN, and includes an authorization token (TOKEN A) and a content key (K-NEW) derived from the public key of the communication device and a private key of the CP. The authorization token is sent (10) to the CDN and a delivery token (TOKEN B) and delivery node address are received (15). The delivery token and content key are sent (18) to the delivery node and encrypted content is received (30), the encrypted content comprises content as initially encrypted by the CP and as further encrypted by the CDN using the content key. The encrypted content is decrypted (31) using a private key of the device (10).
Abstract:
A cloud-based application allows a client to obtain audit log information from an application. The application also allows the client to specify which audit log information from the application is reported and secured to a log file of the application.
Abstract:
A system and method are disclosed for secure storage of customer's public and private data in a personal data store (24). Companies communicate with a secure data storage server (16) using a public encryption key linked to a registered IP Address, customers (12) communicate with a private encryption key, and encrypted data can be stored using a variety of encryption keys. The personal data store (24) can be used for preparing customer product views, linking personal data to avoid repeated customer data entries, customer identification and loyalty card linking. Encrypted stored data ensures no other person can read it.
Abstract:
Systems and methods for security hardening of a file in transit and at rest via segmentation, shuffling and multi-key encryption are presented. The method including segmenting at a first computer system a file into a plurality of file segments, and encrypting the plurality of file segments using a plurality of encryption keys in order to generate a corresponding plurality of encrypted file segments, wherein each file segment of the plurality of file segments is encrypted using a respective encryption key of the plurality of encryption keys. Additionally included is bidirectional data transformation of a file by obfuscating at a first computer system digital values of the file in order to generate corresponding obfuscated digital values of the file, wherein the obfuscated digital values of the file retain their contextual integrity and referential integrity
Abstract:
Embodiments of systems and methods disclosed herein provide a simple and effective method for authentication and key exchange that is secure from man-in-the-middle attacks and is characterized by perfect forward secrecy. More specifically, in certain embodiments, the systems and methods are disclosed that enable secure communications between a local device and a remote device(s) via a protocol that uses a Central Licensing Authority that shares derived secrets with the endpoints, without sharing the secrets themselves. The derived secrets may be comprised of public information, taking the form of nonces, in order to protect the system against replay-style attacks. Each endpoint can generate its own nonce with sufficient entropy such that neither endpoint is dependent on the trustworthiness of the other.
Abstract:
The invention relates to a method for allowing secure communication between a server and a client web browser running on a client communication device which is connectable with the server over an electronic communication channel, characterised by comprising: - providing a HTML webpage at the server - sending a JavaScript program to the client web browser when the HTML webpage is downloaded by the client web browser, which JavaScript program is configured, when executed by the client web browser, to: generate a client asymmetric key pair consisting of a client public key and a client private key, create a first client data package comprising the client public key, and send the first client data package to the server over the electronic communication channel.
Abstract:
L'invention concerne un procédé de sécurisation d'un canal de transmission de données entre un réseau de départ (N1) et un réseau de destination (N3) à travers un réseau de transit (N2) d'un niveau de sécurité plus faible, les données comprenant des premières données comprenant des données de voix et des secondes données. Il comprend les étapes suivantes, lorsque les données sont transmises du réseau de départ vers le réseau de transit : - aiguillage (102) des secondes données vers une étape de cryptage selon au moins un protocole IPsec pour obtenir des données cryptées; et - transmission (114) des données cryptées vers le réseau de transit; - aiguillage (102) des premières données vers une étape de codage selon le protocole de traitement IPsec pour obtenir des données codées; - transmission (114) des données codées vers le réseau de transit.