|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
09/2008 | Recent | 08: Dec | Nov | Oct | Sp | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 07: D | N | O | S | A | J | J | M | A | M | F | J | | 06: 12 | 11 | 10 | 09 | 8 | 7 | 6 | 5 | 4 | Dec | Nov | | 2010 | 2009 |
Cryptography September archived by title and patent number 09/08Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 09/25/2008 > patent applications in patent subcategories. archived by title and patent number
20080232580 - Secret sharing apparatus, method, and program: A secret sharing apparatus according to the present invention is based on a (k,n)-threshold scheme with a threshold of at least 4. The secret sharing apparatus generates a generator matrix (G) of GF(2) in which any k of n column vectors are at a full rank, divides secret information into... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080232581 - Data parallelized encryption and integrity checking method and device: A method and device for encrypting and/or decrypting binary data blocks protecting both confidentiality and integrity of data sent to or received from a memory. The encryption method comprises steps of: applying to the input data block a reversible scrambling process, the scrambling process providing a scrambled data block in... Agent: Seed Intellectual Property Law Group PLLC
20080232582 - Method for dynamically authenticating programmes with an electronic portable object: A method for dynamically authenticating an executable program, that is the continuation of the instructions defined thereby, is performed repeatedly during the very execution of the program. The method for making secure an electronic portable object through execution of a program supplied by another insecure electronic object uses, inter alia,... Agent: Buchanan, Ingersoll & Rooney PC
20080232583 - Vehicle segment certificate management using shared certificate schemes: The present invention advantageously provides techniques to solve problems with combinatorial anonymous certificate management by addressing critical issues concerning its feasibility, scalability, and performance. Methods and procedures to manage IEEE 1609.2 anonymous and identifying cryptographic keys and certificates in the Vehicle Infrastructure Integration (VII) system are presented, along with methods... Agent: Telcordia Technologies, Inc.
20080232584 - Hand-held decoder card having a parallax barrier portion and a light filtering portion and method of making same: The present document describes a hand-held decoder card for revealing information hidden in a printed material and information hidden in a color image and method of making the same. The hand-held decoder card comprises: translucent material having a parallax barrier portion comprising parallel barrier lines for revealing the information hidden... Agent: Benoit & Co.
20080232586 - Information terminal apparatus, information processing apparatus and information communication system: When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may be certified as legitimate measured by a portable apparatus with a GPS reception function employed by a user. When transmitting information related to... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080232585 - Method for code generation: A method for generating codes for encrypting data of an encrypting device and for decrypting said data by a decrypting device. The method includes the steps of providing a personal identification code to the encrypting device, the personal identification code being known or obtainable by the decrypting device, and selecting... Agent: Nixon & Vanderhye, PC
20080232588 - System and method for implementing content protection in a wireless digital system: A system includes a line-based receiver for receiving protected content from a source and a line-based transmitter for providing the protected content to a destination. The protected content is secure, such as by using a High-bandwidth Digital Content Protection (HDCP) mechanism. Between the line-based transmitter and receiver is a wireless... Agent: Haynes And Boone, LLP
20080232589 - Robust delivery of packet based secure voice: A method is provided for transmitting voice data in a secure communication system. The method includes: transmitting voice data using a plurality of data packets; embedding a cryptographic message indicator into each of the plurality of data packets; and correcting for bit errors in the cryptographic message indicator at a... Agent: Harness, Dickey & Pierce, P.L.C
20080232596 - Data processing apparatus and program: A data processing apparatus capable of updating and writing a plurality of distributed information items generated based on to-be-held secret information with respect to a data storage device in which access is not limited includes a secret distribution processing portion which generates a plurality of distributed information items updated this... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080232592 - Method and apparatus for performing selective encryption/decryption in a data storage system: One embodiment of the present invention provides a system for performing selective encryption/decryption in a data storage system. During operation, the system receives a data block from a storage medium at an input/output layer, wherein the input/output layer serves as an interface between the storage medium and a buffer cache.... Agent: Pvf -- Oracle International Corporation C/o Park, Vaughan & Fleming LLP
20080232590 - Micropayment processing method and system: A method of producing an offer package includes defining, within the offer package, a description of an offered product. The cost of the offered product and the merchant making the offer are also defined within the offer package, which includes an encrypted version of the offered product.... Agent: Perkins Coie LLP Patent-sea
20080232591 - Simple and efficient one-pass authenticated encryption scheme: The present invention provides encryption schemes and apparatus, which are more efficient than the existing single pass authenticated encryption schemes, while providing the same level of security. The initial vectors, which are an essential part of these schemes, are chosen in an incremental and safe fashion. This also leads to... Agent: Scully, Scott, Murphy & Presser, P.C.
20080232594 - Symmetric key subscription: A method and system for symmetric key subscription. A register R issues to a subject A a possession that stores a first symmetric key X or comprises a deriving means configured to derive the first symmetric key X. The register R receives from a counterparty B a request for a... Agent: Schmeiser, Olsen & Watts
20080232593 - System and method for logical shredding of data stored on worm media: Files are encrypted and stored on a WORM media device along with their encryption keys, the binary values of which are stored as a combination of written and unwritten sectors in a key storage portion of the media. To shred a file, the associated key is destroyed simply by writing... Agent: Rogitz & Associates
20080232595 - Vehicle segment certificate management using short-lived, unlinked certificate schemes: The present invention advantageously provides a system and method for management of cryptographic keys and certificates for a plurality of vehicles. Each vehicle of the plurality of vehicles generates public/private key pairs, requests multiple time-distributed certificates, creates an encrypted identity, and surrenders expired certificates. An assigning authority receives the public/private... Agent: Telcordia Technologies, Inc.
20080232597 - Iterative symmetric key ciphers with keyed s-boxes using modular exponentiation: Disclosed is the design and development of a new cipher called the Dragonfire Cipher. The Dragon cipher includes message authentication code and keyed random number generator. Dragonfire cipher takes this transparent method of generating S-boxes and uses them to create a cipher with keyed S-boxes. This defeats most precomputations for... Agent: Fleit Gibbons Gutman Bongini & Bianco P.l.
20080232598 - System, method and apparatus to obtain a key for encryption/decryption/data recovery from an enterprise cryptography key management system: A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password... Agent: Hewlett Packard Company
20080232599 - Content distributing method, computer-readable recording medium recorded with program for making computer execute content distributing method and relay device: Content data is distributed by distributing enciphered content data from a higher (upper) distribution source through a relay node to a lower information processing device; obtaining a decoding key data for decoding by the lower information device content data associated with a viewing/listening area managed by the relay node; and... Agent: Staas & Halsey LLP
20080232600 - Transaction device with noise signal encryption: A transaction device adds or injects a random noise component into signals representing (x,y) coordinate signals associated with user interface with an input screen associated with the device. The noise component can be generated by converting to analog the output of a random number generator, and then adding the noise... Agent: Fay Kaplun & Marcin, LLP09/18/2008 > patent applications in patent subcategories. archived by title and patent number
20080226062 - Method for secure transmission of data: A system and method concerns a secure transmission of a file fragmentable into a plurality of fragments, and comprises (a) initially fixing a global encryption key; (b) encrypting the fragmentable file based on said global key to form a first encrypted file; (c) encrypting the global key by means of... Agent: Marshall, Gerstein & Borun LLP
20080226063 - Simple universal hash for plaintext aware encryption: A simple universal hash apparatus and method include input means for inputting at least one of a plurality of Plaintext blocks into an integrity aware encryption scheme using at least one of two secret keys to obtain a plurality of Ciphertext blocks; Plaintext checksum means for computing a Plaintext checksum... Agent: F. Chau & Associates, LLC
20080226064 - Chinese remainder theorem - based computation method for cryptosystems: A computer hardware implemented cryptography method computes a modular exponentiation, M:=Cd (mod p·q) upon a message data value C using a Chinese Remainder Theorem (CRT) based technique. To secure against cryptanalysis,, the private key moduli p and q are transformed by multiplication with a generated random value s, so that... Agent: Schwegman, Lundberg & Woessner / Atmel
20080226065 - Method for secure communication between a secure hardware device and a computer and apparatus for changing a shared secret for generating a session key for a secure communication between a secure hardware device and a computer: e) wherein the first application defines a first session key and generates first session key indication data based on the first secret set, said first session key indication data including the identifier of the first secret set as the only element from the first secret set, and transmits said first... Agent: Dr. Mark M. Friedman C/o Bill Polkinghorn - Discovery Dispatch
20080226066 - Apparatus for batch verification and method using the same: A batch verification apparatus and method wherein, the method includes: generating a plurality of secret keys, a plurality of public keys corresponding to the plurality of secret keys, and a plurality of verification values corresponding to the plurality of public keys; calculating a first batch verification value based on the... Agent: Stein, Mcewen & Bui, LLP
20080226067 - Method and circuit for encrypting a data stream: Current legislation requires the possibility of encryption when storing television programmes received by broadcast. However, legacy playback apparatuses will not be able to play back such encrypted data in a regular way, but possibly in a wrong way. This may result in problems like damage of speakers. Therefore, the application... Agent: Philips Intellectual Property & Standards
20080226068 - Scrambling for anonymous visual communication: A video communication system is disclosed which allows one or more of the participants to selectively participate anonymously by scrambling regions of the video of arbitrary shape, such as the face of the participant. Initially, the video content is analyzed to locate an arbitrary shape of interest, such as a... Agent: Patent Administrator Katten Muchin Rosenman LLP
20080226069 - Apparatus and method for providing protection from malware: An apparatus for protecting against malware comprises a first and a second processing module. The first processing module encrypts an input data generated by an input device. The encryption reduces unauthorized data monitoring by spyware. The second processing module is attached to the front of a protected data destination. The... Agent: Michael Molins Molins & Co.
20080226070 - Coordinate-based encryption system, method and computer program product: An encryption system, method, and computer program product are provided. After the receipt of encrypted content, a plurality of coordinates associated with a location of a device are identified. In use, the content is decrypted utilizing the coordinates.... Agent: Zilka-kotab, PC
20080226071 - Method for establishing secure associations within a communication network: A method for security authentication within a wireless network is disclosed. A method within an adhoc mesh network for two devices to quickly determine roles (i.e. which is the authenticator and which is the supplicant) while establishing a security association is provided for. The invention further provides for the inclusion... Agent: Motorola, Inc
20080226072 - Range measurement apparatus and method using chaotic uwb wireless communication: Provided is a range measurement apparatus and method based on chaotic ultra wideband (UWB) wireless communication. The apparatus includes a chaotic signal generating/modulating unit for generating/modulating chaotic signals and outputting them to a transceiving unit; a transceiver for transceiving radio signals; a detector for detecting the radio signals in forms... Agent: Lowe Hauptman Ham & Berner, LLP
20080226074 - Method and apparatus for ciphering packet units in wireless communications: A method and apparatus are disclosed relating to ciphering and de-ciphering of packet units in wireless devices during retransmission in wireless communications. The packet units are re-segmented with the ciphering done on the re-segmented packet unit or on a radio link control protocol data unit (RLC PDU) with or without... Agent: Volpe And Koenig, P.C. Dept. Icc
20080226073 - Method and apparatus for security in a data processing system: Method and apparatus for secure transmissions. Each user is provided a registration key. A long-time updated broadcast key is encrypted using the registration key and provided periodically to a user. A short-time updated key is encrypted using the broadcast key. The short-time key is available with each broadcast message, wherein... Agent: Qualcomm Incorporated
20080226076 - Providing a user device with a set of access codes: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key and an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding... Agent: Louis Paul Herzberg
20080226075 - Restricted services for wireless stations: A technique for providing restricted access to a wireless network involves recognizing a service descriptive identifier (SDID). The SDID may be transmitted to wireless stations that query the wireless network so that the wireless stations can at least gain access to restricted services provided by the wireless network. The SDID... Agent: Perkins Coie LLP
20080226077 - Apparatus, method, and computer program product for playing back content: A content playback apparatus includes an SKF selecting unit that selects one segment key file from plural segment key files recorded in a DVD media at a time of playback of a content of the sequence key section, a data selecting unit that selects each content corresponding to a segment... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080226081 - Data recovery method, image processing apparatus, controller board, and data recovery program: A disclosed data recovery method, image processing apparatus, controller board, and data recovery program enable data stored encrypted in a storage unit within an information processing apparatus to be recovered when an internal encryption key of the apparatus becomes unavailable. A first encryption key is stored in a secure memory,... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080226078 - Enabling recording and copying data: A data encryption key may be generated for encrypting data content. The data encryption key includes multiple portions. For example, the data encryption key may be generated by combining a drive seed and a media seed where the drive seed includes a value that is unique to the drive reading... Agent: Microsoft Corporation
20080226080 - Encryption key restoring method, information processing apparatus, and encryption key restoring program: A disclosed encryption key restoring method enables restoration of an encryption key in the event of inability to use the encryption key stored in a secure memory of an information processing apparatus, in which data encrypted by the encryption key is stored in an internal storage unit. A disclosed information... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20080226079 - Method and apparatus for conditionally decrypting content: Provided is a method of conditionally decrypting content. In the method, whether a content key for encrypting and/or decrypting content is revoked is determined, and encrypted content is selectively decrypted using the content key.... Agent: Sughrue Mion, PLLC
20080226082 - Systems and methods for secure data backup: Systems and methods are provided for securely backing up data files of a computing system onto a backup device. An encryption key is generated using some identification found on and unique to the computing system. The encryption key is used to encrypt the data which is then stored on the... Agent: Gard And Kaslow, LLP
20080226083 - Key calculation method and key agreement method using the same: A key calculation method and a shared key generation method, the key calculation method including: generating two keys to perform a key calculation; calculating a first value based on coefficients having an identical coefficient value among coefficients included in each of the two keys; and performing a coordinates operation or... Agent: Stein, Mcewen & Bui, LLP09/11/2008 > patent applications in patent subcategories. archived by title and patent number
20080219435 - Information transmitting apparatus, information transmitting method, and computer product: An information transmitting apparatus encrypts and transmits transmit data that includes contents for which transmission instruction has been received, an authentication code, and padding. The information transmitting apparatus includes a padding calculating unit that calculates a size of the padding based on an encrypting algorithm, a size of the authentication... Agent: Staas & Halsey LLP
20080219438 - Method and apparatus for generating a public key in a manner that counters power analysis attacks: A public key for an Elliptic Curve Cryptosystem is generated in a manner that acts as a countermeasure to power analysis attacks. In particular, a known scalar multiplication method is enhanced by, in one aspect, performing a right shift on the private key. The fixed-sequence window method includes creation and... Agent: Ridout & Maybee Suite 2400
20080219437 - Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks: When multiplicative splitting is used to hide a scalar in an Elliptic Curve scalar Multiplication ECSM operation, the associated modular division operation employs the known Almost Montgomery Inversion algorithm. By including dummy operations in some of the branches of the main iteration loop of the Almost Montgomery Inversion algorithm, all... Agent: Ridout & Maybee Suite 2400
20080219436 - Method and apparatus for providing a digital rights management engine: A method receives a set of data. Further, the method receives a traffic key. In addition, the method determines a traffic protection group for the set of data. The method also encrypts the set of data according to the traffic key to generate an encrypted set of data. Finally, the... Agent: Motorola, Inc. Law Department
20080219439 - Image processing apparatus, encryption communications device, encryption communications system, and computer readable medium: An image processing apparatus includes: a first value generation unit that generates a first value changing in time sequence; a second value generation unit that generates a second value changing in time sequence identical with the time sequence of the first value; a synchronization unit that synchronizes the first and... Agent: Oliff & Berridge, Plc
20080219440 - Electronic device and software interlocking security system: The present invention provides for a security system for an electronic device that, in one embodiment, includes a processor with a software access key encrypted thereon and a software application with a processor access key encoded therein so that operation of the electronic device and execution of the software application... Agent: Hitt Gaines P.c.
20080219441 - Arrangement comprising an integrated circuit: An integrated circuit (1) is provided with function modules (2) which comprise a central processing unit (4) for treating data and executing a program and a cache memory (5). Until now, it was complicated and costly to ensure the manipulation security of the modules. The function modules (2) comprise an... Agent: Baker Botts L.l.p. Patent Department
20080219442 - Information processing apparatus and method, and a program: Disclosed herein is an information processing apparatus that processes an encrypted content. The apparatus includes a control section configured to control the following processes, such as a generation process, a moving range determination process, a holding process, a copying process, and an inactivation process. Such processes are to be performed... Agent: Wolf Greenfield & Sacks, P.c.
20080219443 - Apparatus and method for an iterative cryptographic block: A method and apparatus for an iterative cryptographic block under the control of a CPU and without a fixed number of stages. In one embodiment, a first cryptographic block descrambles received information using an internal key or a preprogrammed key to form a descrambled key or descrambled data. A data... Agent: Blakely Sokoloff Taylor & Zafman LLP
20080219445 - Communications audit support system: A communications audit support system is provided, which makes it possible to audit communications of an arbitrary encrypted communication session at any time. The communications audit support system of the present invention stores key information used for encrypted communication in a key management DB in association with a key ID... Agent: Mcdermott Will & Emery LLP
20080219446 - Electronic transmission device, and signal transmission method: An electronic signal transmission apparatus executes an authentication process with a transmitting electronic device over a transmission line and receives an encrypted signal and first and second key information therefrom. The encrypted signal is decrypted based on the first key information, displayed and/or recorded, and re-encrypted using the second key... Agent: Lerner, David, Littenberg, Krumholz & Mentlik
20080219444 - Method for the secure loading in a nfc chipset of data allowing access to a service: A method for the secured loading of data into a first secured host processor of an NFC system comprising an NFC interface circuit for sending and receiving data, enabling a service to be accessed, the method comprising: generating a secret data, transmitting the secret data to the first host processor... Agent: Panitch Schwarze Belisario & Nadel LLP
20080219447 - Systems and methods of secure coding for physical layer communication channels: Systems and methods of securely communicating from a sender device to a receiver device on a communication channel are disclosed. One disclosed method is for securely communicating from a sender device to a receiver device on a main channel when an eavesdropper device is listening on an eavesdropper channel. The... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20080219449 - Cryptographic key management for stored data: A method is provided for performing application-transparent key management in a storage library associated with an encrypting removable storage device. Encryption and decryption is performed by a key manager and the removable storage device, and is transparent to the application. Data is encrypted using keys that are managed by the... Agent: Morrison & Foerster LLP
20080219450 - Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting: For an Elliptic Curve Scalar Multiplication (ECSM) operation to be performed on a scalar and a base point, a given previous set of parameters that was used to split the scalar for a previous ECSM operation and a selected random integer are used to determine a new set of parameters... Agent: Ridout & Maybee Suite 2400
20080219448 - Multiple-layers encryption/decryption and distribution of copyrighted contents: A method and an apparatus for providing multiple-layers of encryption/decryption of contents and the transferring of protected content between devices based on each device's multiple IDs. Furthermore, it related to a two-way secure communication between two or more devices. The encryption/decryption is based on a common content ID that is... Agent: Louis Ventre Jr
20080219451 - Method and system for mutual authentication between mobile and host devices: Provided are a method and a system for mutual authentication between mobile and host devices. The mobile device stores a first secret key and is connected to the host device. The method includes generating a second secret key using the first secret key and first data that is received from... Agent: Sughrue Mion, Pllc
20080219452 - Wireless device and key exchange method thereof: A wireless device (100) for exchanging keys with another wireless device (200) includes a key request module (121), a key generation module (122), and a key transfer module (123). The key request module requests to exchange a key by transmitting a request-key-change frame to the another wireless device. The key... Agent: Pce Industry, Inc. Att. Cheng-ju Chiang
20080219453 - Maintaining keys removed from a keystore in an inactive key repository: Provided are a method, system, and article of manufacture for maintaining keys removed from a keystore in an inactive key repository. A keystore includes active keys, wherein at least one active key in the keystore is associated with at least one storage device and available for encrypting and decrypting data... Agent: Konrad Raynes & Victor, LLP. Attn: Ibm3709/04/2008 > patent applications in patent subcategories. archived by title and patent number
20080212769 - Processing method for message integrity with tolerance for non-sequential arrival of message data: Example embodiments of the present invention disclose a method for processing an application packet for transmission includes receiving a plurality of segments of the application packet in a byte stream, the byte stream including a plurality of blocks, creating a plurality of superblocks within the byte stream by grouping a... Agent: Harness, Dickey & Pierce, P.L.C
20080212770 - Key information generating method and device, key information updating method, tempering detecting method and device, and data structure of key information: A domain key is used to perform chaining decryption with respect to encrypted content key information (ST203-1), and first data is extracted (ST203-2). The extracted first data is compared with partial-check data (ST203-4). The first data as it is encrypted is extracted from the m pieces of encrypted content key... Agent: Mcdermott Will & Emery LLP
20080212771 - Method and devices for user authentication: For authenticating a user using a communication terminal (1) to access a server (4) via a telecommunications network, a personal identification code is received from the user From secure session establishment protocol messages exchanged (S1, S2, S3) between the communication terminal (1) and the server (4), a data set is... Agent: Browdy And Neimark, P.l.l.c. 624 Ninth Street, Nw
20080212772 - Image forming apparatus: An image forming apparatus includes a receiving unit for receiving data encrypted with a first encryption method and sent from a host device; a decryption unit for decrypting the data thus encrypted; an embedded data generation unit for re-editing the data thus decrypted to generate embedded information; an embedded information... Agent: Kubotera & Associates, LLC
20080212773 - Parallel data stream decryption device: A parallel data stream decryption device which allows a user to decrypt radar video data obtained from a missile seeker which was encrypted while in a parallel data format. The decryption device has a computer program which decryptes the radar video data contained in an encrypted data file and creates... Agent: Navairwd Counsel Group
20080212774 - Device for and a method of processing an encrypted data stream in a cryptographic system: A device (3200) for processing an encrypted data stream (3201) in a cryptographic system, in which decryption data (3204) are provided for decrypting each segment (3202) of the encrypted data stream (3201) for reproduction of the decrypted data stream, wherein the device (3200) comprises a first determining unit (3209) for... Agent: Philips Intellectual Property & Standards
20080212775 - Novel trick mode system: A method is described for trick mode playback, the method including selecting a key-frame in a recording substantially in the vicinity of a trick mode playback starting position, preparing a decryption key associated with a key period including the selected key-frame, sending the prepared decryption key to a descrambler, thereby... Agent: Welsh & Katz, Ltd
20080212776 - Encryption processing circuit and encryption processing method: An encryption processing circuit includes: a decoder configured to convert a binary input data used for predetermined encryption computing into a first plurality of bit data of a constant hamming weight independently of a hamming weight of the input data; a wiring network configured to receive the first plurality of... Agent: Foley And Lardner LLP Suite 500
20080212777 - Methods and apparatus for multi-level dynamic security system: Methods and apparatus for converting original data into a plurality of sub-bands using wavelet decomposition; encrypting at least one of the sub-bands using a key to produce encrypted sub-band data; and transmitting the encrypted sub-band data to a recipient separately from the other sub-bands.... Agent: Connolly Bove Lodge & Hutz LLP
20080212782 - Approach for managing access to messages using encryption key management policies: Controlling access to disseminated messages includes implementing one or more key management policies that specify how various encryption keys are maintained and in particular, when encryption keys are made inaccessible. Deleting a particular key renders inaccessible all copies of messages, known or unknown, associated with the particular key, regardless of... Agent: Hickman Palermo Truong & Becker, LLP
20080212778 - Communication system and communication apparatus: A communication system and communication apparatus that can improve the stability and security of communication. In this communication system, a communication apparatus (101) generates, at a predetermined interval, a keep-alive message based on key information stored in a key information database part (113) and transmits the keep-alive message to a... Agent: Dickinson Wright PLLC
20080212780 - Homomorphic encryption for secure watermarking: A method and a system for embedding a watermark in a media signal x are disclosed. The method comprises providing an at least partially encrypted media signal cx of said media signal x, wherein encryption is performed using a first encryption key k1; providing an at least partially encrypted watermark... Agent: Philips Intellectual Property & Standards
20080212779 - Ordering content by mobile phone to be played on consumer devices: A system (400), device (101) (202) (401-404) and method are provided to purchase, download and obtain transferable rights to play content using a mobile telephone. In an alternative embodiment, the mobile telephone is used to purchase content, which then is downloaded using other channels, i.e., a broadband using other consumer... Agent: Philips Intellectual Property & Standards
20080212781 - System, method and apparatus for decrypting data stored on remobable media: A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more... Agent: Hewlett Packard Company
20080212783 - Kerberized handover keying improvements: A media-independent handover key management architecture is disclosed that uses Kerberos for secure key distribution among a server, an authenticator, and a mobile node. In the preferred embodiments, signaling for key distribution is based on re-keying and is decoupled from re-authentication that requires EAP (Extensible Authentication Protocol) and AAA (Authentication,... Agent: Watchstone P+d, PLCPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130509:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 1.23268 seconds