|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
01/2009 | Recent | 13: Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography January recently filed with US Patent Office 01/09Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 01/29/2009 > patent applications in patent subcategories. recently filed with US Patent Office
20090028322 - System for an encryption key path diagnostic: A system is provided to perform a key path diagnostic that aids in isolating an error within the encryption storage system. The system includes at least one drive, a key proxy, a key server, a key manager, and a processor. The processor performs a first communication test on a path... Agent: Jennifer M. Anda IBM Corporation
20090028325 - Circuit arrangement for and method of performing an inversion operation in a cryptographic calculation: In order to further develop a circuit arrangement for as well as a method of performing an inversion operation in a cryptographic calculation, wherein only inversion modulo an odd number is allowed, it is proposed that the inversion operation is performed modulo at least one even number.... Agent: Nxp, B.v. Nxp Intellectual Property Department
20090028323 - Enhancing the security of public key cryptosystem implementations: In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase to populate a data structure. Then, a first random number multiplied by a public key is added to each value in the data structure, in modulo of a second random number multiplied by... Agent: Beyer Law Group LLP
20090028324 - Method and system for providing scrambled coded multiple access (scma): A multiple access scheme is described. A first bit stream is scrambled from a first terminal according to a first scrambling signature. A second bit stream is scrambled from a second terminal according to a second scrambling signature, wherein the first bit stream and the second bit stream are encoded... Agent: Bell, Boyd & Lloyd LLP
20090028326 - Methods and apparatus performing hash operations in a cryptography accelerator: Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated with input data and retrieves an instruction set for processing the input data. The instruction set is used to configure or control components such as MD5 and... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20090028327 - Secure content key distribution using multiple distinct methods: Systems and methods of secure content key distribution using multiple distinct methods are disclosed herein. Example embodiments include receiving multiple distinct control words from multiple conditional access systems and encrypting packets or a group of packets using the multiple distinct control words.... Agent: Scientific-atlanta, Inc. Intellectual Property Department
20090028328 - Method and system for forming a content stream with conditional access information and a content file: A communication system includes a content repository 274 storing a content file and a video transport processing system 273 in communication with the content repository 274. The video transport processing system 273 receives a plurality of conditional access information, stores a relative time of arrival of each of the plurality... Agent: The Directv Group, Inc. Patent Docket Administration
20090028330 - Encrypted communication for selectively delivering a message to multiple decrypting devices: Reduces message length of encrypted message to be transmitted selectively to plurality of decrypting devices. An encrypting device includes a generating unit for generating node associating information configured to associate respective terminal nodes in a tree structure with each decrypting device in relation to a group of decrypting devices enabled... Agent: Shimokaji & Associates, P.C.
20090028329 - Method and apparatus for providing security in a radio frequency identification system: A response to an event involves transmitting a communication for propagation away from a part externally thereof, the communication containing first and second segments that are respectively subject to first and second security provisions that are different.... Agent: Haynes And Boone, LLPIPSection
20090028331 - Scrambled digital data item: A method of decrypting a scrambled digital data item at a client is disclosed, the method including: receiving actual control messages at the client, wherein each actual control message includes control word generating information for generating a control word associated with the actual control message; storing the actual control messages... Agent: Husch Blackwell Sanders, LLP Husch Blackwell Sanders LLP Welsh & Katz
20090028332 - Method and apparatus relating to secure communication: Data is encrypted onto an electromagnetic beam by providing an electromagnetic beam having a signal component having a modal state, wherein the signal component is susceptible to accumulation of a geometric phase, and a reference component, transmitted along a path over at least part of which the signal component accumulates... Agent: Staas & Halsey LLP
20090028333 - Method and apparatus for providing security in a radio frequency identification system: One aspect involves receiving by a tag of wireless communications that utilize a first security provision, and wireless communications that utilize a second security provision different from the first security provision. A different aspect involves receiving by an entity of an authentication request that is based on a first digital... Agent: Haynes And Boone, LLPIPSection
20090028334 - Method and apparatus for providing security in a radio frequency identification system: One aspect involves a communication that contains a portion encrypted with a selected key can be wirelessly transmitted by a part for reception and decryption by plural tags. A different aspect involves a tag receiving a first sequence of wireless communications that each contain sequencing information regarding the first sequence,... Agent: Haynes And Boone, LLPIPSection
20090028335 - System and method for secure access control in a wireless network: Secure access to a wireless network access can be provided in a system where wireless devices access a wireless network through a wireless access point (WAP). For example, a plurality of pre-shared keys (PSKs) may be generated and distributed to the WAP and the wireless device. The wireless device may... Agent: Pillsbury Winthrop Shaw Pittman, LLP
20090028336 - Encryption key path diagnostic: A method and a computer program product are provided to perform a key path diagnostic that aids in isolating an error within the encryption storage system. A first communication test is performed on a path between the key proxy and the drive. The first communication test verifies that the path... Agent: Jennifer M. Anda IBM Corporation
20090028337 - Method and apparatus for providing security in a radio frequency identification system: A method and apparatus involve storing in a tag a selected digital certificate that permits secure access to said tag from externally thereof.... Agent: Haynes And Boone, LLPIPSection
20090028338 - Software product authentication: The present application discloses a method and a system for authenticating software products. Computer software is often sold with a unique validation number. In order to register the product a user has to connect to a remote server and he is then asked to enter the validation number. The disadvantage... Agent: Nixon & Vanderhye, PC
20090028339 - Auto-configuration of a drive list for encryption: A method, a system and a computer program product are provided to auto configure a drive list. When information is received for a drive, the key manager compares the information to drive information on a drive list. If the drive is not on the drive list the drive list is... Agent: International Business Machines Corporation
20090028341 - Communication system, communication device and processing method therefor: A master generates a session key, receives public keys from a plurality of slaves, encrypts the session key using the individual public keys, transmits the encrypted session key to the plurality of slaves, encrypts data using the encrypted session key, and sends it to the plurality of slaves. A plurality... Agent: Fitzpatrick Cella Harper & Scinto
20090028340 - Tunable compact entangled-photon source and qkd system using same: A robust, quickly tunable narrow-linewidth entangled photon source system based on Spontaneous Parametric Down Conversion (SPDC) of the pump light in periodically polled LiNbO3 (PPLN) waveguides. The photon source provides narrow-linewidth, entangled output photons having a wavelength in the telecom C-Band wavelength. To tailor the output spectrum of the output... Agent: OpticusIPLaw, PLLC
20090028342 - Systems, methods, and media for adding an additional level of indirection to title key encryption: Systems, methods and media for encrypting and decrypting content files are disclosed. More particularly, hardware and/or software for adding an additional level of indirection to a title key encryption scheme are disclosed. Embodiments may include generating by a cryptographic system a binding key based on binding information. Embodiments may also... Agent: Ibm Corporation (jss) C/o Schubert Osterrieder & Nickelson PLLC
20090028343 - Method and apparatus for providing an asymmetric encrypted cookie for product data storage: A process may be utilized by a device to implement public key asymmetric encryption. The process encrypts a data set with a symmetric encryption key to form an encrypted data set. Further, the process encrypts the symmetric encryption key with a public key component of an asymmetric encryption key to... Agent: Motorola, Inc. Law Department01/22/2009 > patent applications in patent subcategories. recently filed with US Patent Office
20090022310 - Cryptographic device and method for generating pseudo-random numbers: A cryptographic device and a cryptographic method of generating pseudo-random numbers. Initial data is divided into a plurality of words on b bits defined in a finite body GF(2b). The words are assigned to cells of a state table to form an initial state block. The cells of the state... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.c.
20090022309 - Method of providing text representation of a cryptographic value: A method of representing crytographic values in text form is described. The text representation is formed from words selected from a vocabulary, which may include a collection of pseudowords. The text representations can be further transformed to a paragraph in an apparently grammatically correct form.... Agent: Blake, Cassels & Graydon LLP
20090022308 - Primitives for fast secure hash functions and stream ciphers: Techniques are disclosed to enable efficient implementation of secure hash functions and/or stream ciphers. More specifically, a family of graphs is described that has relatively large girth, large claw, and/or rapid mixing properties. The graphs are suitable for construction of cryptographic primitives such as collision resistant hash functions and stream... Agent: Lee & Hayes Pllc
20090022307 - Systems and methods for efficient generation of hash values of varying bit widths: A technique for producing a hashed output of an input message according to any number of hash algorithms (e.g. SHA-256, SHA-348, SHA-512) having varying bit widths is described. At least a portion of the input message is stored in a first group of registers each having a bit width equal... Agent: Ingrassia Fisher & Lorenz, P.c. (fs)
20090022311 - Method of compressing a cryptographic value: A method of compressing a cryptographic value. The method comprising the steps of: (a) selecting a secret value; (b) performing a cryptographic operation on the secret value to generate the cryptographic value; (c) determining whether the cryptographic value satisfies the pre-determined criteria; and (d) repeating the sequence of steps starting... Agent: Blake, Cassels & Graydon LLP
20090022312 - Apparatus and method for document synchronization: A computer readable storage medium includes executable instructions to convert a destination document into a destination document tree hierarchy. The destination document tree hierarchy is flattened into a destination document hash table comprising a set of destination document keys and a set of destination document values. A source document is... Agent: Cooley Godward Kronish LLP Attn: Patent Group
20090022313 - Encrypted data processing method, encrypted data processing program and encrypted data processing apparatus: An encrypted data processing method for a printing system provided with a host which transmits print data or encrypted data formed by encrypting the print data, and an image forming apparatus connected with the host via a communication network to execute printing based on the print data, the method including:... Agent: Buchanan, Ingersoll & Rooney Pc
20090022314 - Information processing device, read terminal, non-public information read system, non-public information read method, information processing program, and non-public information read program: In a personal information access system 1, a bar-code information output 106 of an information processing device 10 makes bar-code information by associating personal information with term information defining a valid period of the personal information, a password, and terminal-identification information unique to an access terminal 20 permitted to gain... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.c.
20090022315 - Security module for securing an encrypted signal with system and method for use therewith: A security module includes a signal interface for receiving an encrypted signal and a host interface that is coupleable to a host. A processing module is operable to receive encrypted decryption code from the host via the host interface, decrypt the encrypted decryption code to form decrypted decryption code that... Agent: Garlick Harrison & Markison
20090022316 - Methods and apparatus for reducing airlink congestion and processing time associated with ciphering information in a wireless network: One illustrative method involves the steps of receiving a ciphering mode information message from a wireless network; identifying and processing valid radio bearer downlink ciphering activation time information in the ciphering mode information message when it is part of a security mode command message; and refraining from processing any valid... Agent: Research In Motion Attn: Glenda Wolfe
20090022318 - Content data distribution terminal and content data distribution system: A content distribution terminal includes a user key data generation unit generating new user key data representing a new version of the user key data; a user key update unit capturing, from the recordable medium, already-recorded user key data that has already been recorded on the recordable medium, and ordering... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20090022317 - Vehicle security system: A vehicle security system includes a reception device that is mounted on a vehicle, and a transmission device that remotely operates the vehicle. The transmission device includes an encryption section that encrypts identification information that identifies the transmission device with a first encryption key, and a transmission section that transmits... Agent: Harness, Dickey & Pierce, P.L.C
20090022320 - Content copying device and content copying method: A content copying device has a mutual authentication section that performs a mutual authentication with a copy source recording medium and a copy destination recording medium respectively and generates a first medium unique key and a second medium unique key, a content key decrypting section that reads an encrypted content... Agent: Greenblum & Bernstein, P.L.C
20090022322 - Entanglement-based qkd system with active phase tracking: Entanglement-based QKD systems and methods with active phase tracking and stabilization are disclosed. The method includes generating in an initial state-preparation stage (Charlie) pairs of coherent photons (P1) at a first wavelength. Second harmonic generation and spontaneous parametric downconversion are used to generate entangled pairs of photons (P5) having the... Agent: Opticus Ip Law, Pllc
20090022319 - Method and apparatus for securing data and communication: A method and apparatus for securing digital data, and applications for securing multiple data items such as multiple files or messages exchanged between two communicating parties. The methods use a randomly created non-repetitive codec, with which the information to be encrypted is XORed. The codec is XORed with a user... Agent: Soroker-agmon Advocate And Patent Attorneys
20090022321 - Personal information management system, personal information management program, and personal information protecting method: The present invention provides a personal information management system, a personal information management program and a personal information protecting method capable of storing personal information in consideration of security protection and facilitating utilization of the stored information. A personal information management system for handling personal information has a function of... Agent: Buchanan, Ingersoll & Rooney Pc
20090022324 - Information processing apparatus, content providing system, information processing method, and computer program: Disclosed herein is an information processing apparatus that serves as a server that performs data transmission in response to receipt of media information from a user device. The information processing apparatus includes: an encrypted transmission data storage database that stores a transmission data identifier and encrypted transmission data such that... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.c.
20090022323 - Secret key predistribution method: A secret key predistribution method is provided. The secret key predistribution method includes the steps of: performing a tree structure establishment process by causing a center to release a tree structure and causing sensor nodes to store the released tree structure; performing a seed key and hashed key generation process... Agent: Ladas & Parry LLP
20090022325 - Access control protocol for embedded devices: The client requests from the authentication and authorization server a capability for accessing the target server. The authentication and authorization server sends client a capability (capC,S) comprising the public key (pubC) of the client, said capability being signed with a private key (privAA) of the authentication and authorization server. The... Agent: Buchanan, Ingersoll & Rooney Pc
20090022326 - Qkd system with common-mode dithering: A QKD system (10) having two QKD stations (Alice and Bob) optically coupled by an optical fiber link (FL), wherein Bob includes a variable timing delay arranged between Bob's controller (CB) and modulator (MB) or detector unit (40). A set-up and calibration procedure is performed wherein delay DL2 is adjusted... Agent: Opticus Ip Law, Pllc01/15/2009 > patent applications in patent subcategories. recently filed with US Patent Office
20090016523 - Masking and additive decomposition techniques for cryptographic field operations: Masking and additive decomposition techniques are used to mask secret material used in field operations (e.g., point multiplication operations) performed by cryptographic processes (e.g., elliptic curve cryptographic processes). The masking and additive decomposition techniques help thwart “side-channel” attacks (e.g., power and electromagnetic analysis attacks).... Agent: Fish & Richardson P.C.
20090016524 - Peer to peer identifiers: In an ad hoc peer-to-peer type network during peer discovery, information relating to users of various devices is broadcast to other devices in the network, which can compromise privacy of the users. Instead of announcing a public identifier that might be known by a multitude of individuals, the user device... Agent: Qualcomm Incorporated
20090016525 - Encoding/decoding apparatus: An encoding/decoding apparatus comprises a central processing unit and an encryption/decryption accelerator coupled to the central processing unit. The accelerator comprises an input for input data to be encrypted/decrypted, an arithmetic logic unit coupled to said input for performing selectable operations on data obtained from said input data and an... Agent: Seed Intellectual Property Law Group PLLC
20090016526 - Method and apparatus for intercepting events in a communication system: An intercept system provides more effective and more efficient compliance with legal intercept warrants. The intercept system can provide any combination of operations that include near-real-time intercept capture of intercepted data in structured authenticated form, clear text intercept for communications where there is access to encryption keys, cipher text intercept... Agent: Stolowitz Ford Cowger LLP
20090016527 - Method of establishing a session key and units for implementing the method: A method of establishing a session key Ks for a session between a unit for descrambling scrambled multimedia signals and a removable cryptographic unit, wherein: —one of the units sends (steps 166, 184) the other unit a message containing a received random number, a term α and a signature of... Agent: Stites & Harbison PLLC
20090016528 - Device, system, and method of obfuscating data processed within an integrated circuit: Device, system, and method of power trace obfuscation. In some embodiments an integrated circuit may include a signal modifier to introduce a pseudo-randomly selected modification to a state-transition pattern of at least one signal, which is related to internal processing of data within the integrated circuit. Other embodiments are described... Agent: Empk & Shiloh, LLP C/o Landon Ip, Inc.
20090016529 - Method and system for prevention of unauthorized communication over 802.11w and related wireless protocols: A method for disrupting undesirable wireless communication in wireless network is provided. The method includes providing one or more sniffer devices to monitor wireless communications in a wireless network and detecting a wireless connection established between an access point device and a client device using the one or more sniffer... Agent: Airtight Networks
20090016530 - Rolling code security system: A rolling code transmitter is useful in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with... Agent: Fitch Even Tabin And Flannery
20090016531 - Method and system for secured real time protocol in scalable distributed conference applications: A method of providing secured teleconference in a distributed teleconference system including providing one or more servers interconnected in a distributed structure, providing at least two participants which include at least one speaker; where each participant is a listener. Each participant is connected to a server and is associated with... Agent: Gibbons P.C.
20090016533 - Controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster: Methods, systems, and products are disclosed for controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster that include receiving in the content server from a network device a key management block for the cluster, a unique data token for... Agent: International Corp (blf)
20090016536 - Data encryption system and method: A data encryption system implemented by running on a cache-equipped computer an encryption program including transformation tables each of which contains a predetermined number of entries. All or necessary ones of the transformation tables are loaded into the cache memory before encryption/decryption process. This causes encryption/decryption time to be made... Agent: Dickstein Shapiro LLP
20090016535 - Fuzzy keys: A method can be provided for performing encryption using a fuzzy key. The method can comprise generating a message, dividing a fuzzy key into a plurality of blocks; and generating an encrypted message by selecting a block from the fuzzy key corresponding to a bit position or bit pattern in... Agent: Mcdonnell Boehnen Hulbert & Berghoff LLP
20090016534 - Method and system of generating immutable audit logs: This method and system uses means of cryptographic techniques reproducing the functionality of a continuous roll of paper. The audit logs can contain any kind of data information (text, voice, video, actions . . . ) and this invention provides full guarantees for data integrity: order of data logged can't... Agent: Ratnerprestia
20090016532 - Portable data carrier featuring secure data processing: Disclosed is a method for securely processing data in a portable data carrier. Said method is characterized by the following steps: a) the data to be processed is requested; b) the data to be processed is encoded; c) the encoded data is temporarily stored in a buffer storage zone of... Agent: Bacon & Thomas, PLLC
20090016537 - Method of authenticating and reproducing content using public broadcast encryption and apparatus therefor: Provided are a method and apparatus for mutually authenticating devices in a group and reproducing content using public broadcast encryption. The method of authenticating a first device and a second device includes acquiring specific information of the second device from the second device, transmitting data, containing the acquired specific information... Agent: Sughrue Mion, PLLC
20090016538 - Delivery of messages to a reciever mobile device: A system for delivering messages to a receiver mobile device and a method and memory storing instructions therefor are described. The system comprises a key server arranged to: transmit a first signal responsive to receipt of a message from a sender mobile device; transmit a delivery confirmation notice responsive to... Agent: Hewlett Packard Company01/08/2009 > patent applications in patent subcategories. recently filed with US Patent Office
20090010425 - Encryption/decryption device, encryption/decryption device manufacturing device, and method, and computer program: A Feistel type common key block cipher process configuration capable of maintaining the involution property and safety and easily changing the number of rounds is realized. The Feistel type cipher process configuration having an SP type F function which includes a nonlinear conversion section and a linear conversion section configures... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20090010424 - System and methods for side-channel attack prevention: A side channel attack utilizes information gained from the physical implementation of a cryptosystem. Software and hardware-based systems and methods for preventing side channel attacks are presented. Cryptographic hardware may introduce dummy operations to compensate for conditional math operations in certain functions such as modular exponentiation. Cryptographic hardware may also... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20090010423 - Systems and methods for protecting data secrecy and integrity: A technique for integrating message authentication with encryption and decryption is disclosed. Intermediate internal states of the decryption operation are used to generate a validation code that can be used to detect manipulation of the encrypted data. The technique is optimized with respect to processing time, execution space for code... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20090010427 - Check authorization system and method: A device is provided that includes a monetary instrument having a surface, and a magnetic ink character recognition (MICR) line coupled to that surface. The MICR line includes an ABA number, a customer account number, and a one-way hash value. The one-way hash value is output from a hashing process... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20090010426 - System and method for providing load balanced secure media content and data delivery in a distributed computing environment: A system and method for providing load balanced secure media content and data delivery (10) in a distributed computing environment is disclosed. Media content is segmented and encrypted into a set of individual encrypted segments on a centralized control center (15). Each individual encrypted segment has the same fixed size.... Agent: Carr & Ferrell LLP
20090010428 - Asymmetric cryptosystem employing paraunitary matrices: Disclosed are multivariate paraunitary asymmetric cryptographic systems and methods that are based on paraunitary matrices. An algebraic approach is employed in designing the multivariate cryptographic systems and methods. The cryptographic systems and methods are based on formulating a general system of multivariate polynomial equations by paraunitary matrices. These matrices are... Agent: Law Offices Of Kenneth W. Float
20090010429 - Apparatus and method for transmitting and receiving video data in digital broadcasting service: A method and apparatus for transmitting and receiving video data in a digital broadcast are provided. The digital broadcast transmitting method includes encrypting selected frames of video data into digital broadcast data, and transmitting the digital broadcast data. The digital broadcast receiving method includes receiving video data in a digital... Agent: JeffersonIPLaw, LLP
20090010430 - Streaming system for distributing encrypted compressed image data, and streaming method therefor: The present invention is directed to a streaming system for encrypting compression-encoded image data to distribute it via network of a predetermined transport protocol, and a streaming server used in this system transmits, to a client terminal, on the RTP packet basis, stream data encrypted so that encryption is performed... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20090010431 - Method for the rapid synchronisation of a device for receiving scrambled data, using an optimised calculation of a synchronisation value: The disclosure relates to a method of synchronising a device for receiving scrambled data, using at least one periodic scrambling sequence which is divided into K time intervals, each interval comprising N bit periods known as symbols. In particular, one such method includes calculating a synchronisation value of at least... Agent: Westman Champlin & Kelly, P.A.
20090010434 - Method of establishing a cryptographic key, network head and receiver for this method, and method of transmitting signals: This method of establishing a cryptographic session key comprises: a subscription phase (104) during which an identifier of a local loop to the end of which a receiver must be connected is acquired, and an authentication step comprising: a) an operation (142) of automatically obtaining an identifier of the local... Agent: Stites & Harbison PLLC
20090010433 - Schryption method and device: A schryption of a text message is based on a schryption key for defining one or more aspects of an encryption and/or a decryption of the text message. For an encryption of the text message, the schryption key is derived from a user key in the form of an encryption... Agent: Frank C. Nicholas Cardinal Law Group
20090010432 - Storage system executing encryption and decryption processing: A storage system 1 includes a channel interface (IF) unit 11 having an interface with a server 3, a disk IF unit 16 having an interface with a hard disk group 2, a memory unit 21 for storing data to be read/written from/to the server 3 or the hard disk... Agent: Antonelli, Terry, Stout & Kraus, LLP
20090010435 - Apparatus and method for adjustment of interference contrast in an interferometric quantum cryptography apparatus by tuning emitter wavelength: An apparatus and method are disclosed for maximizing interference contrast in an interferometric quantum cryptography system to detect eavesdropping by utilizing a tunable emitter station in communications with a receiver station via a quantum communications channel and a “public” communications channel. The tunable emitter station tracks and compensates for interferometer... Agent: Moetteli & Associates Sarl
20090010436 - Decipherable searchable encryption method, system for such an encryption: A method for encrypting/decrypting a message includes the initial step of generating keys by the sub-steps of generating a public key; generating a decryption key; and generating a derivation key. For a first entity, the message is encrypted using the public key and a cipher. For a second entity, the... Agent: Buchanan, Ingersoll & Rooney PC
20090010437 - Information processing device, information recording medium, information processing method, and computer program: A data placement configuration which ensures seamless playback of contents having segment portions including multiple different variations of encrypted data is provided. With regard to contents having segment portions configured of multiple different variations of encrypted data to which individual segment keys have been applied, and non-segment portions serving as... Agent: Bell, Boyd & Lloyd, LLP
20090010438 - Security mechanism for wireless video area networks: A device is disclosed including a security module to generate and update cryptographic keys to establish a secure relationship between the device and one or more station devices in a wireless video area network (WVAN) and a domain manager to maintain a list of the station devices that are authorized... Agent: Blakely Sokoloff Taylor & Zafman LLP
20090010439 - Terminal apparatus, server apparatus, and digital content distribution system: To reduce a frequency of recording communication management information for communication disconnection countermeasure. A digital content distribution system includes a license server (101) that issues a license, and a user terminal (103) that controls use of content based on the issued license. The license server (101) judges, according to the... Agent: Wenderoth, Lind & Ponack L.L.P.01/01/2009 > patent applications in patent subcategories. recently filed with US Patent Office
20090003588 - Counter sealing archives of electronic seals: The description generally provides for systems and methods for a mobile communication network. Archives of seals can be sealed to protect the integrity of the seals and facilitate validation in the event a sealing party's sealed registration document is revoked. A document can be sealed multiple times to nest seals... Agent: Proskauer Rose LLP
20090003590 - Multi-dimensional montgomery ladders for elliptic curves: An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in elliptic curve cryptography (ECC) such as for computing scalar multiplications in, e.g. batch ECC operations, accelerating Lenstra's ECM factoring algorithm,... Agent: Blake, Cassels & Graydon LLP
20090003589 - Native composite-field aes encryption/decryption accelerator circuit: A system comprises reception of input data of a Galois field GF(2k), mapping of the input data to a composite Galois field GF(2nm), where k=nm, inputting of the mapped input data to an Advanced Encryption Standard round function, performance of two or more iterations of the Advanced Encryption Standard round... Agent: Buckley, Maschoff & Talwalkar LLC Attorneys For Intel Corporation
20090003591 - Quantum cryptographic communication method: A sender (1) adds decoy photons to a secret photon having confidential information, then, subjects each photon to a different rotational manipulation, and passes the photons along a quantum channel (3) (S11 and S12). A receiver (2) receives those photons and then obtains information about the position of the decoy... Agent: Oliff & Berridge, PLC
20090003592 - Content delivery system, delivery server, terminal, and content delivery method: Disclosed herein is a content delivery system which may include a delivery server for delivering content data, a terminal for downloading the content data, and a network. The delivery server may include, an encryption section, and a delivery section. The terminal may include a reception section. The terminal or the... Agent: Lerner, David, Littenberg, Krumholz & Mentlik
20090003596 - Efficient elliptic-curve cryptography based on primality of the order of the ecc-group: Time to perform scalar point multiplication used for ECC is reduced by minimizing the number of shifting operations. These operations are minimized by applying modulus scaling by performing selective comparisons of points at intermediate computations based on primality of the order of an ECC group.... Agent: Intel Corporation C/o Intellevate, LLC
20090003594 - Modulus scaling for elliptic-curve cryptography: Modulus scaling applied a reduction techniques decreases time to perform modular arithmetic operations by avoiding shifting and multiplication operations. Modulus scaling may be applied to both integer and binary fields and the scaling multiplier factor is chosen based on a selected reduction technique for the modular arithmetic operation.... Agent: Intel Corporation C/o Intellevate, LLC
20090003595 - Scale-invariant barrett reduction for elliptic-curve cyrptography: The computation time to perform scalar point multiplication in an Elliptic Curve Group is reduced by modifying the Barrett Reduction technique. Computations are performed using an N-bit scaled modulus based a modulus m having k-bits to provide a scaled result, with N being greater than k. The N-bit scaled result... Agent: Intel Corporation C/o Intellevate, LLC
20090003593 - Unified system architecture for elliptic-curve crytpography: A system for performing public key encryption is provided. The system supports mathematical operations for a plurality of public key encryption algorithms such as Rivert, Shamir, Aldeman (RSA) and Diffie-Hellman key exchange (DH) and Elliptic Curve Cryptosystem (ECC). The system supports both prime fields and different composite binary fields.... Agent: Intel Corporation C/o Intellevate, LLC
20090003597 - Small public-key based digital signatures for authentication: Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a public key value based on the modulus N and the pseudorandom string value; generating a private key value corresponding to the public key... Agent: Qualcomm Incorporated
20090003598 - Encrypting apparatus for common key cipher: The first route selection device re-arrays a plurality of extended key mask values at random according to the value of a random number generated by a random number generation device. An extended key operation device generates an exclusive logical OR of a plurality of the re-arrayed extended key mask values,... Agent: Staas & Halsey LLP
20090003599 - Systems and methods for publishing selectively altered sensor data in real time: Systems and methods are provided for publishing selectively altered sensor data. One system includes a plurality of sensors coupled to a processor. The sensors are configured to generate data, and the processor is configured to fuse and publish a portion of the data from each of the plurality of sensors... Agent: Honeywell International Inc.
20090003600 - Progressive download or streaming of digital media securely through a localized container and communication protocol proxy: Various embodiments are directed towards employing a container and communication protocol proxy component within a client device to receive securely real-time streamed, progressively downloaded, or adaptively streamed container over a network using one container and communication protocol, and to securely decrypt the container and provide it to a media player... Agent: Darby & Darby P.C.
20090003601 - Alpha-masked image matching: A method and system is disclosed for authenticating a physical medium (1405). The method starts by retrieving (1406) a reference digital signature (1412) previously determined (1403) based upon visual characteristics of an area (1402) of a reference physical medium (1400). A candidate digital signature (1415) is determined based upon visual... Agent: Fitzpatrick Cella Harper & Scinto
20090003602 - Electronic information embedding method and extracting method, electronic information burying apparatus and extracting apparatus, and programs therefor: On embedding electronic watermark data in point group data obtained from a three-dimensional measurement, an x-y plane region defining the point group data is divided into a plurality of small regions so that a point group is produced with respect to each of small regions. The coordinate values of each... Agent: Crowell & Moring LLP Intellectual Property Group
20090003603 - Platform independent networked communications: Among other things, techniques and systems are described for facilitating networked communication among media players of various platforms, PCs with various DVD-ROM drives, mobile data processing devices and one or more network servers. At a network server, a request for communication is received from a client device. A secured network... Agent: Fish & Richardson, PC
20090003604 - Synchronization of encryption in a wireless communication system: Disclosed embodiments include a method for synchronizing a cryptosystem. In one embodiment, the method uses existing control data that is transmitted as part of a connection establishment process in a wireless communication system. In one embodiment, messages that are normally sent between a base station and a remote unit during... Agent: At&t Corp.
20090003605 - Temporal proximity to verify physical proximity: A security system assesses the response time to requests for information to determine whether the responding system is in physical proximity to the requesting system. Generally, physical proximity corresponds to temporal proximity. If the response time indicates a substantial or abnormal lag between request and response, the system assumes that... Agent: Philips Intellectual Property & Standards
20090003607 - Altering the size of windows in public key cryptographic computations: In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. Then an exponentiation phase is performed, wherein the exponentiation phase includes two or more parsing steps, wherein each of the parsing steps includes parsing a part of a cryptographic key into a window... Agent: Beyer Law Group LLP
20090003608 - Block-level storage device with content security: A block-level storage device is provided that implements a digital rights management (DRM) system. In response to receiving a public key from an associated host system, the storage device challenges the host system to prove it has the corresponding private key to establish trust. This trust is established by encrypting... Agent: Macpherson Kwok Chen & Heid LLP
20090003606 - Changing the order of public key cryptographic computations: In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. This may be accomplished by creating a permutation of an order of powers and then performing a table initiation phase using a part of a key and the permuted order of powers to... Agent: Beyer Law Group LLP
20090003609 - Method for updating encryption keystores within a data processing system: A method for updating encryption keystores within a computer network having multiple host computers is disclosed. A keystore is initially loaded into a key manager within one of the host computers. In response to a key request by a peripheral device within the computer network, a determination is made whether... Agent: Dillon & Yudell, LLPPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130613:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.62406 seconds