Abstract:
Security in wireless communication networks that employ relay stations to facilitate communications between base stations and mobile stations is enhanced. In one embodiment, resource information provided to one or more relay stations from a base station or another relay station is encrypted prior to being delivered to the one or more relay stations. Only authorized relay stations are allocated an appropriate key necessary to decrypt the resource information. As such, only appropriate relay stations are able to access and use the resource information to effect communications directly or indirectly between the base stations and the mobile stations. In certain embodiments, the resource information is delivered between the various base and relay stations using either unicast or multicast delivery techniques.
Abstract:
In some embodiments, the invention is a personal digital network ("PDN") including hardware (sometimes referred to as Ingress circuitry) configured to transcript encrypted content that enters the PDN. Typically, the transcription (decryption followed by re-encryption) is performed in hardware within the Ingress circuitry and the re-encryption occurs before the decrypted content is accessible by hardware or software external to the Ingress circuitry. Typically, transcrypted content that leaves the Ingress circuitry remains in re-encrypted form within the PDN whenever it is transferred between integrated circuits or is otherwise easily accessible by software, until it is decrypted within hardware (sometimes referred to as Egress circuitry) for display or playback or output from the PDN. Typically, the PDN is implemented so that no secret in Ingress or Egress circuitry (for use or transfer by the Ingress or Egress circuitry) is accessible in unencrypted form to software or firmware within the PDN or to any entity external to the PDN. Other aspects of the invention are methods for protecting content in a PDN (e.g., an open computing system) and devices (e.g., multimedia graphics cards, set top boxes, or video processors) for use in a PDN.
Abstract:
Disclosed are a method and a system for synchronizing and providing data requiring digital rights protection, to a portable device, wherein a contents providing server is connected with a contents synchronization server to which the portable device is connected.
Abstract:
Systems and methods are provided for securing data for transmission to a wireless device. The systems and methods may include an electronic messaging system used to send and receive data over a first network and also used to forward data to a wireless device operable in a second network. The electronic messaging system may receive an electronic message encrypted with a first encryption algorithm and addressed to a message recipient in the first network, the message recipient having an associated wireless device operable in the second network. The electronic messaging system may determine that the electronic message is to be transported across the second network to the wireless device, and in response to determining that the electronic message is to be transported across the second network, encrypt the electronic message using a second encryption algorithm and transmit the encrypted message over the second network to the wireless device, with the second encryption algorithm being a stronger encryption algorithm than the first encryption algorithm.
Abstract:
A method, system and apparatus are described for avoiding the use of a web-server or generic security when providing network administration services remotely to managed entities using wireless technology. Instead a true Proxy device, not operating as a web-server, is used to pre-process all command traffic from wireless input devices (WID). The intervention between the WID and the managed entities of the Proxy isolating the managed entities from the WID, enhanced by encoding using a novel messaging protocol, further enhanced by a novel security model based on multiple pre-shared keys and algorithms together with identifiers and passwords that are not transmitted, achieves several bandwidth and security advantages including the ability to deliver TELNET services across the Internet and behind a firewall.
Abstract:
A method of handling cryptographic information in a communication comprising body elements and attachment elements to a mobile device includes the steps of determining if the communication includes an attachment element comprisingcryptographic information and converting the attachment element into a body element upon determining that the communication includes an attachment element comprising cryptographic information.
Abstract:
Autentication functions are centralized in a secutity system to offload servers of this functionality, and to provide an end-to-end solution for secure internet transactions. The security system supports authentication functions for authenticating a server by requesting server certificates from a certificate authority, and sending server certificates to clients requesting authentication. The security system also authenticates clients by checking digital signatures, validating the client certificates, which includes checking CA signatures, checking the validity period of the signatures, maintaining a certificate revocation list (CRL), and checking client certificates against the CRL.
Abstract:
A communication network (12) encrypts a first portion (63A) of a transaction (60A, 60B) associated with point-to-point communications (23, 25) using a point-to-point encryption key (27). A second portion (65) of the transaction (60A, 60B) associated with end-to-end communications is encrypted using an end-to-end encryption key (46).
Abstract:
A mediating server (200) mediates a printing request of a client (100) to a printer (300). To avoid a firewall (F/W) installed between the mediating server (200) and the printer (300), the printer (300) sends an HTTP request to the mediating server (200), and the mediating server (200) sends a printing request together with an HTTP response. Encryption communication between the client (100) and the printer (300) can be made according to the following procedures. The mediating server (200) deciphers, with a secret key, data ciphered with a public key by the client. The mediating server (200) re−ciphers the data with another secret key and mediates the data to the printer (300). The printer (300) deciphers the data with a public key to print the data. In such a way, printing in responce to a request of a client can be done over network environments the securities of which are ensured.