Abstract:
A method of user-transparent auto re-synchronization for a remote keyless entry system includes assigning a default challenge-count window (101). A first data packet including a first transmitter-side symbolic count (103) and a first command code is transmitted by a transmitter (200) and authenticated by a receiver (250). An auto-synchronization challenge-count window is assigned when the first transmitter-side symbolic count (103) is not bounded within the challenge-count window (109). A second data packet including a second transmitter-side symbolic count (103) and a second command code is transmitted by the transmitter (200) and authenticated by the receiver (250). The challenge-count window is returned to the default challenge-count window, when the second transmitter-side symbolic count is bounded within the auto-synchronization challenge-count window and the receiver-side symbolic count (123). Then the second command code is executed (127).
Abstract:
A method of user-transparent auto re-synchronization for a remote keyless entry system includes assigning a default challenge-count window (101). A first data packet including a first transmitter-side symbolic count (103) and a first command code is transmitted by a transmitter (200) and authenticated by a receiver (250). An auto-synchronization challenge-count window is assigned when the first transmitter-side symbolic count (103) is not bounded within the challenge-count window (109). A second data packet including a second transmitter-side symbolic count (103) and a second command code is transmitted by the transmitter (200) and authenticated by the receiver (250). The challenge-count window is returned to the default challenge-count window, when the second transmitter-side symbolic count is bounded within the auto-synchronization challenge-count window and the receiver-side symbolic count (123). Then the second command code is executed (127).
Abstract:
A soft logic cryptographic circuit that can be reprogrammed with various cipher algorithms. The cryptographic circuit can be manufactured in a non-secure environment because a security sensitive cipher algorithm can be programmed after the manufacturing process.
Abstract:
A method and apparatus for digital-rights management is provided herein. Various forms of authorization are allowed, with each form of authorization being dependent upon an action taken on the digital content. In particular, when server-based authorization is unavailable, less-risky operations are allowed by performing an internal authorization scheme. Thus, higher security offered by a server-based DRM is required for risky actions, yet non-risky actions on the digital content may still be taken when the server is unavailable.
Abstract:
A cryptographic apparatus for encrypting and decrypting digital words includes a mechanism that permits a cipher algorithm to be electronically stored after the manufacture of the apparatus. The storing mechanism includes at least one electrically erasable, programmable gate array containing a portion of the cipher algorithm and at least one random access memory device coupled to the array for storing digital data generated by the algorithm. A mechanism which is coupled to the gate array and memory device controls the execution of the algorithm for each digital word thereby decrypting encrypted digital words and encrypting non-encrypted digital words.
Abstract:
A method and apparatus for digital-rights management is provided herein. Various forms of authorization are allowed, with each form of authorization being dependent upon an action taken on the digital content. In particular, when server-based authorization is unavailable, less-risky operations are allowed by performing an internal authorization scheme. Thus, higher security offered by a server-based DRM is required for risky actions, yet non-risky actions on the digital content may still be taken when the server is unavailable.
Abstract:
A soft logic cryptographic circuit that can be reprogrammed with various cipher algorithms. The cryptographic circuit can be manufactured in a non-secure environment because a security sensitive cipher algorithm can be programmed after the manufacturing process.
Abstract:
A cryptographic apparatus for encrypting and decrypting digital words includes a mechanism that permits a cipher algorithm to be electronically stored after the manufacture of the apparatus. The storing mechanism includes at least one electrically erasable, programmable gate array containing a portion of the cipher algorithm and at least one random access memory device coupled to the array for storing digital data generated by the algorithm. A mechanism which is coupled to the gate array and memory device controls the execution of the algorithm for each digital word thereby decrypting encrypted digital words and encrypting non-encrypted digital words.
Abstract:
A method and apparatus for digital-rights management is provided herein. Various forms of authorization are allowed (509, 511), with each form of authorization being dependent upon an action taken on the digital content. In particular, when server-based authorization is unavailable (510), less-risky operations are allowed by performing an internal authorization scheme (509). Thus, higher security offered by a server-based DRM (505) is required for risky actions, yet non-risky actions on the digital content may still be taken when the server is unavailable (513).
Abstract:
A communications device (300) enabled to support both external voice communications functionality (301) (or other external communications of interest and choice) and other functionality (302) has at least a first and second mode of operation (304 and 305). The first mode of operation permits essentially all functionality while the second mode of operation precludes at least much of the other functionality in favor of preserving the viability of at least some of the external communications functionality. A selector (306) can select a given mode of operation based, at least in part, on a trigger 307 comprising, for example, a user input and/or detection of a condition of concern.