|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
02/2009 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography February patent applications/inventions, industry category 02/09Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 02/26/2009 > patent applications in patent subcategories. patent applications/inventions, industry category
20090052658 - Descrambling circuit, error detection code calculating circuit and scrambling circuit: A descrambling circuit includes three or more scramble value generators, each configured to generate a new scramble value by a formula at a state of shifting number of times different from each other by every eight bits based on a predetermined generator polynomial, a scramble value generated by the generator... Agent: Amin, Turocy & Calvin, LLP
20090052656 - Method and system for block cipher encryption: A method of encrypting a block of data, is described, the method including providing a combining unit operative to combine a key with a block of data, the block of data expressed as a block of bits, providing a mix and condense unit operative to mix bits included in the... Agent: Husch Blackwell Sanders, LLP Husch Blackwell Sanders LLP Welsh & Katz
20090052655 - Method for encryption and decryption: It is described a method of encrypting digital information in a sender and decrypting said digital information in a receiver, where said sender and receiver agree on a block of a working key. First a sender generates a secret padding code. Said sender combines said digital information with the said... Agent: Kilpatrick Stockton LLP
20090052657 - Method for scalar multiplication in elliptic curve groups over binary polynomial fields for side-channel attack-resistant cryptosystems: A method for transforming data with a secret parameter in an elliptic curve cryptosystem based on an elliptic curve defined over an underlying binary polynomial field, includes multiplying a point of the elliptic curve, and representing the data to be transformed by a scalar representing the secret parameter, wherein the... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20090052659 - Method and apparatus for generating an advanced encryption standard (aes) key schedule: An Advanced Encryption Standard (AES) key generation assist instruction is provided. The AES key generation assist instruction assists in generating round keys used to perform AES encryption and decryption operations. The AES key generation instruction operates independent of the size of the cipher key and performs key generation operations in... Agent: Intel Corporation C/o Intellevate, LLC
20090052660 - Method for encrypting and decrypting instant messaging data: This invention provides a method for encrypting and decrypting Instant Messaging data. A client encrypts Instant Messaging data using a data encryption key and transmits the data encryption key to a server; the server encrypts the data encryption key using a uniform server key and transmits the encrypted data encryption... Agent: Harness, Dickey & Pierce, P.L.C
20090052661 - Reduced hierarchy key management system and method: A controller receives an encrypted media stream (“EMS”) and an identifier indicative of a selected content key from a headend. The EMS is encrypted with an encryption key and can be decrypted with a corresponding decryption key which is determinable from the selected content key. The controller receives indexes and... Agent: Brooks Kushman P.C.
20090052662 - Method and system for a recursive security protocol for digital copyright control: Systems and methods are described which utilize a recursive security protocol for the protection of digital data. These may include encrypting a bit stream with a first encryption algorithm and associating a first decryption algorithm with the encrypted bit stream. The resulting bit stream may then be encrypted with a... Agent: SprinkleIPLaw Group
20090052664 - Bulk data erase utilizing an encryption technique: Disclosed is a method for eliminating access to data on removable storage media of a removable storage media cartridge. A key is stored on the removable storage media cartridge, such that data on the removable storage media is accessible with the key. Upon receiving a command to eliminate access to... Agent: International Business Machines Corporation
20090052665 - Bulk data erase utilizing an encryption technique: A system and a computer program product are disclosed for eliminating access to data on removable storage media of a removable storage media cartridge. The system comprises a data storage drive that stores a key on the removable storage media cartridge, such that data on the removable storage media is... Agent: International Business Machines Corporation
20090052663 - Methods for creating secret keys based upon one or more shared characteristics and systems thereof: A method and system for generating one or more keys includes obtaining at two or more devices data based on movement of at least one of the devices with the respect to the other device. At least one key is generated based on the obtained data at each of the... Agent: Nixon Peabody LLP - Patent Group
20090052666 - Variable data encryption of characters printed or displayed on screen, which may be embedded in photos, images, drawings, illustrations, logos or figures, for security purposes: It is a source of security digital characters, incomprehensible to the naked eye, which can only be identified when the transparent substrate (acrylic, plastic or another material) is placed over the substrate on which they were printed (paper, PVC, polyester, film or others), or over the screen where they are... Agent: Eaton Peabody Patent Group, LLC
20090052667 - Near field registration of home system audio-video device: A near field communication (NFC) sticker which stores a key is attached to a new client device. A remote commander in a home network reads the key using a NFC interface and IR-transmits it to a home network server. Once the client is connected to the network, it encrypts its... Agent: Rogitz & Associates
20090052668 - Method for providing a video signal and descramble card and video apparatus using the same: A method for providing a video signal, and a descramble card and a video apparatus using the same are disclosed. The video apparatus includes a first interface which receives a scrambled video signal, and outputs the scrambled video signal, a second interface which transmits the scrambled video signal to a... Agent: Sughrue Mion, PLLC
20090052670 - Method and apparatus for storing digital content in storage device: Disclosed are a method and apparatus for storing digital content in a storage device. A content key, which is a key used by a host for encrypting content when the content is stored to a storage device connected to the host, is encrypted by using a storage key of the... Agent: Sughrue Mion, PLLC
20090052669 - Method and system for disaster recovery of data from a storage device: Aspects of the invention provide a method and system for securely managing the storage and retrieval of data. Securely managing the storage and retrieval of data may include receiving a first disaster recovery code and acquiring a first password corresponding to the first disaster recovery code. A first disaster recovery... Agent: Mcandrews Held & Malloy, Ltd
20090052671 - System and method for content protection: The invention provides a system and method for content protection. A system in accordance with an embodiment includes a media center connectable to a mobile master memory unit associated with an identifier, the media center including: a protection key; storage means for storing files identified by respective file identifiers; a... Agent: Hoffman Warnick LLC
20090052672 - System and method for protection of content stored in a storage device: The invention provides a system and method for content protection. A system according to an embodiment includes a media center connectable to a mobile secure and protection keyring associated with an identifier and with a media Key block MKB. The media center includes: a unique identifier identifying the media center... Agent: Hoffman Warnick LLC
20090052674 - Key distribution control apparatus, radio base station apparatus, and communication system: A key distribution control apparatus, a radio base station apparatus and a communication system for improving security. A communication system (10) comprises an Access controller (100), which serves as a key distribution control apparatus, a wireless LAN base station apparatus (200) and a communication terminal (300). The Access controller (100)... Agent: Dickinson Wright PLLC James E. Ledbetter, Esq.
20090052673 - Method and apparatus for decoding broadband data: The invention relates to a method for decrypting encrypted broadband data by one or more authorised users comprising the following steps: provision of the encrypted broadband data (10) for a plurality of users; provision of encrypted or non-encrypted key data (30), which is of a comparatively narrower band than the... Agent: Meyertons, Hood, Kivlin, Kowert & Goetzel, P.C.
20090052675 - Secure remote support automation process: Secure Remote Support Automation Process wherein a remote support server receives a support task request and schedules a predefined task to a predefined actor who also has a predefined escalation policy and notifies the support actor of the scheduled task along with a key, a key seed, or a credential... Agent: Patentry02/19/2009 > patent applications in patent subcategories. patent applications/inventions, industry category
20090046849 - Data integrity and non-repudiation method: A method is disclosed for establishing data integrity and non-repudiation without hashing and without performing a bit to bit comparison of the message. The method includes: generating a random symmetric key for use with a symmetric encryption algorithm; generating a random sequence having a plurality of elements; separating a message... Agent: Steptoe & Johnson, LLP
20090046848 - Encryption management system: Systems and methods are presented for increasing the security of transmitted message. A text selection component selects at least one portion of a document that contains sensitive information. A text extraction component extracts characters belonging to a selected character set from at least one selected portion of the document. An... Agent: Tarolli, Sundheim, Covell & Tummino LLP
20090046850 - General data hiding framework using parity for minimal switching: A framework is provided for reducing the number of locations modified when hiding data, such as a digital watermark, in binary data. The framework complements data hiding techniques, such as digital watermarking techniques. After determining potential embedding locations according to an underlying technique, a data structure is created with values... Agent: Amin, Turocy & Calvin, LLP
20090046851 - Method and system for atomicity for elliptic curve cryptosystems: A method and system are provided for atomicity for elliptic curve cryptosystems (ECC-systems). The method includes a side channel atomic scalar multiplication algorithm using mixed coordinates. The algorithm including repeating a sequence of field operations for each elliptic curve addition or doubling operation to provide an atomic block, wherein an... Agent: Hoffman Warnick LLC
20090046852 - Method and system for generating implicit certificates and applications to identity-based encryption (ibe): The invention relates to a method of generating an implicit certificate and a method of generating a private key from a public key. The method involves a method generating an implicit certificate in three phases. The public key may be an entity's identity or derived from an entity's identify. Only... Agent: Blake, Cassels & Graydon LLP
20090046853 - Method and system for generating a pair of public key and secret key: A method of generating a pair of public key and secret key, includes the steps of selecting a public key; selecting a secret key; computing a heavy prime number in responsive to the public key and the secret key; factoring the heavy prime number by selecting first and second prime... Agent: David And Raymond Patent Firm
20090046854 - Method for a public-key infrastructure providing communication integrity and anonymity while detecting malicious communication: An inventive scheme for detecting parties responsible for repeated malicious activities in secure and anonymous communication is presented. The scheme comprises generating a pool of keys, distributing to and associating with each party a small number of keys chosen randomly from the pool, revoking a key when it is detected... Agent: Telcordia Technologies, Inc.
20090046855 - Method and apparatus for caching access information for faster digital cable tuning: A method and apparatus is presented for providing faster tuning of a digital television channel. Specifically, the present invention is directed to a digital television receiver including a tuner, at least one demodulator, a detachable security module such as a point of deployment (POD) module, a transport demultiplexer, and a... Agent: Joseph J. Laks Thomson Licensing LLC
20090046856 - Methods and apparatus for encrypting, obfuscating and reconstructing datasets or objects: A method of encrypting or obfuscating a first dataset, the dataset comprising a plurality of data elements, the method comprising distributing the data elements among one and at least one other of a plurality of discrete further datasets. Also provided is a method of reconstructing a first dataset from two... Agent: Brooks Kushman P.C.
20090046857 - Quantum cryptography transmission system and optical device: A quantum cryptography transmission system according to the present invention comprises a transmission device (10A), a reception device (20A), and a transmission path (30) configured to connect between the devices. The transmission device includes a light emitting unit (11) configured to emit photons serving as quantum bit information carriers, and... Agent: Sughrue Mion, PLLC
20090046859 - Methods for the generation of identical symmetrical cryptographic keys: Methods and algorithms for generating identical symmetrical cryptographic keys. In a method for generating a symmetrical cryptographic key, a first profile is generated, the first profile comprising a series of data points collected over a first period of time. A start time of the first profile is identified and the... Agent: Infineon Technologies Ag Patent Department
20090046858 - System and method of data encryption and data access of a set of storage devices via a hardware key: Systems and methods of storage device data encryption and data access via a hardware key are described here. One embodiment includes a hardware key to intercept a request sent from a host to a storage device to access data stored on one of a set of storage devices, wherein the... Agent: Greenberg Traurig, LLP (onspec/tpl)
20090046860 - Integrated data transceiver and sensor for the generation of a symmetrical cryptographic key: Systems for exchanging encrypted data communications between devices. A system can comprise a first device and a second device. The first device can comprise a first sensor adapted to create a first data profile based at least in part on a sensed condition, and a first transceiver integrated with the... Agent: Infineon Technologies Ag Patent Department
20090046861 - Security for a heterogeneous ad hoc mobile broadband network: A server provides security for a heterogeneous ad hoc mobile broadband network. The server is configured to maintain an encrypted control session with an ad-hoc service provider and a mobile client while enabling the mobile client to support an encrypted data tunnel through the ad-hoc service provider.... Agent: Qualcomm Incorporated
20090046862 - Method and device for speeding up key use in key management software with tree structure: In the key management software having a key database with a tree structure, a high-speed data encryption/decryption process is achieved by changing the tree structure without reducing the security strength when deleting or adding a key from/to the tree structure. The key management software 135 having the key database 146... Agent: Wenderoth, Lind & Ponack L.L.P.02/12/2009 > patent applications in patent subcategories. patent applications/inventions, industry category
20090041229 - Elliptic curve point transformations: In an elliptic curve cryptographic system, point coordinates in a first coordinate system are transformed into a second coordinate system. The transformed coordinates are processed by field operations, which have been modified for operating on the transformed point coordinates. In some implementations, the point coordinates are transformed using a linear... Agent: Fish & Richardson P.C.
20090041232 - Establishing trust without revealing identity: A method, system, and apparatus are provided for establishing trust without revealing identity. According to one embodiment, values in a first proof corresponding to a first statement are precomputed, a request for a second proof is received from a challenger, and the first and second proofs are completed.... Agent: Aslam A. Jeffery Blakely, Sokoloff, Taylor & Zafman LLP
20090041231 - Method and apparatus for partially encrypting speech packets: Provided are a method and apparatus for partially encrypting speech packets, more specifically, a method and apparatus for selecting partial encryption sets used for a partial encryption technique in which compressed speech packets are partially encrypted to obtain the same effect as a full encryption technique. The method includes the... Agent: Ladas & Parry LLP
20090041230 - Mobile client device driven data backup: Tasks associated with backing up the data of a mobile client device are performed predominantly by the mobile client device. A backup server functions as a server with limited functionality that merely stores backup data received from the mobile client device and retrieves the backup data under the request of... Agent: Fenwick & West LLP
20090041233 - Certificate-based encryption and public key infrastructure: The present invention provides methods for sending a digital message from a sender to a recipient in a public-key based cryptosystem comprising an authorizer. The authorizer can be a single entity or comprise a hierarchical or distributed entity. The present invention allows communication of messages by an efficient protocol, not... Agent: Macpherson Kwok Chen & Heid LLP
20090041234 - Method and apparatus for encrypting and decrypting data to/from an escon tape system: A method and apparatus for encrypting data written to an Enterprise System Connection (ESCON) tape system and reading encrypted data from such a tape system and decrypting the encrypted data is described. One illustrative embodiment, in writing encrypted data to an ESCON tape system, receives from a computer over a... Agent: Cooley Godward Kronish LLP Attn: Patent Group
20090041235 - Secure information distribution system utilizing information segment scrambling: A method and apparatus for securing and, optionally, distributing an information stream by divided the information stream into a collection of segments and compressing the segments, rearranging the order of the segments and encrypting the segments.... Agent: Woodcock Washburn LLP
20090041236 - Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups: Stream ciphers, including synchronous stream ciphers, self-synchronizing stream ciphers, and totally asynchronous stream ciphers, employ a working key and a quasigroup transformation, where the quasigroup used is based on an initial secret key. Error-correction and pseudo-random number generation improver methods also employ quasigroup transformations.... Agent: Greer, Burns & Crain
20090041238 - Implicit certificate scheme: A method of generating a public key in a secure digital communication system, having at least one trusted entity CA and subscriber entities A. For each entity A, the trusted entity selects a unique identity distinguishing the entity A. The trusted entity then generates a public key reconstruction public data... Agent: Blake, Cassels & Graydon LLP
20090041237 - Information processing apparatus, information recording medium manufacturing apparatus, information recording medium, method, and computer program: To provide a configuration in which a unit classification number corresponding to a content playback path is set based on various units. A unit classification number defining a playback path of content including encrypted data having different variations generated by encrypting a segment portion which forms the content by using... Agent: Bell, Boyd & Lloyd, LLP
20090041239 - Pseudo-random function calculating device and method and number-limited anonymous authentication system and method: An efficient pseudo-random function and an efficient limited number of times authentication system using such a function are realized. A pseudo-random function calculating device comprises a key creating means and a pseudo-random function calculating means. The key creating means creates a public key made of a set of at least... Agent: Sughrue Mion, PLLC
20090041240 - Uplink scrambling during random access: The technology described in this case facilitates random access by a user terminal with a radio base station. A user terminal determines one of a first type of uplink scrambling sequences and generates a random access message using the determined one of the first type of uplink scrambling sequences. The... Agent: Nixon & Vanderhye, PC
20090041241 - Near field communications system having enhanced security: A near field communication system can include a near field generator configured to generate a near field detectable information signal. The near field generator and supporting circuitry also produces incidental electromagnetic radiation. A masking signal transmitter is used with the near field generator and radiates a masking electromagnetic signal. The... Agent: Thorpe North & Western, LLP.
20090041242 - Method, system, subscriber equipment and multi-media server for digital copyright protection: A method for digital copyright protection includes stream media server negotiation with a copyright center to generate copyright object RO, RO carrying copyright service regulations and establishing encrypted communication channel information; subscriber equipment receiving RO, through the establishing encrypted communication channel information carried by RO to establish encrypted communication channel... Agent: Harness, Dickey & Pierce, P.L.C
20090041243 - Quantum encryption device: A quantum encryption device comprises a faint laser light source for generating a photon serving as a qubit information carrier, three or more asymmetric Mach-Zehnder interference systems each formed by a photonic lightwave circuit, an optical transmission path for transmitting the photon, a photo detector, a device for recording sending... Agent: Sughrue Mion, PLLC
20090041245 - Confidential information processing device,confidential information processing apparatus, and confidential information processing method: A confidential information processing device performs a cryptographic operation on first input data and second input data. A first cryptographic operation circuit includes: a first register for holding first information; and a first cryptographic operation unit. A first pseudo-cryptographic operation circuit includes a second register for holding second information. A... Agent: Greenblum & Bernstein, P.L.C
20090041244 - Secure access system and method: In one embodiment, a storage device is provided that includes: a storage medium; and a storage engine, the storage engine being configured to generate a secure session key and to receive encrypted content and a corresponding encrypted content key from a host system, wherein the content key has been encrypted... Agent: Macpherson Kwok Chen & Heid LLP
20090041246 - Encryption of the scheduled uplink message in random access procedure: Systems and methodologies are described that facilitate employing a random access procedure that leverages encrypted and/or unencrypted data in a scheduled uplink message. A random access preamble can be sent from an access terminal to a base station, and a random access response can be sent from the base station... Agent: Qualcomm Incorporated
20090041247 - Key identifier in packet data convergence protocol header: Systems and methodologies are described that facilitate identifying a plurality of keysets utilized in a communications network. The keysets can include ciphering keys that provide data encryption and decryption and integrity keys that provide data integrity protection. A key identifier can be included in a packet data convergence protocol header... Agent: Qualcomm Incorporated
20090041250 - Authentication method in communication system: An authentication method is provided in which a first portable device generates and transmits a first random number and a first timestamp to a first USIM in the first portable device; the first USIM calculates a first sign for the first portable device; the first portable device requests authentication for... Agent: Docket Clerk
20090041251 - Method and device for agreeing shared key between first communication device and second communication device: Based on security parameters previously agreed upon by first and second communication devices, a first security value is determined by the second communication device and transmitted to the first communication device. The first communication device determines second and third security values based on the security parameters and the first security... Agent: Staas & Halsey LLP
20090041249 - Method and system for managing a key for encryption or decryption of data: A user private key is stored in a database of the user terminal. A user public key and user information are stored in the user management DB. The encryption/decryption unit encrypts an authority private key specific to a first authority given to a user, by using a user public key... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20090041248 - Recording medium, authoring device, and authoring method: A recording medium has authoring data recorded thereon. The authoring data has a plurality of formats. Data items common to all the plurality of formats include, a content, a content key for encrypting the content, a hash value of the content, a media key for encrypting the content key, and... Agent: Snell & Wilmer L.L.P. (panasonic)
20090041252 - Exchange of network access control information using tightly-constrained network access control protocols: In general, techniques are described for securely exchanging network access control information. The techniques may be useful in situations where an endpoint device and an access control device perform a tightly-constrained handshake sequence of a network protocol when the endpoint device requests access to a network. The handshake sequence may... Agent: Shumaker & Sieffert, P.a
20090041253 - System and method for privacy preserving query verification: The present invention relates to a method for proving the correctness of a query result produced by a data publisher while preserving the privacy of the query result. The method comprises delivering a public key of a public key/private key pair from a data owner to a client and delivering... Agent: Cantor Colburn, LLP - IBM Arc Division02/05/2009 > patent applications in patent subcategories. patent applications/inventions, industry category
20090034715 - Systems and methods for encrypting data: Data encryption techniques are presented. According to an embodiment of a method, a cryptographic hash of unencrypted data for data block X−1 is generated, and a hash of an encryption key is generated. An initialization vector for data block X is generated using the cryptographic hash and the hash of... Agent: Schwegman, Lundberg & Woessner/novell
20090034716 - Time apparatus, encryption apparatus, decryption apparatus, and encryption/decryption system: A time apparatus subjects a plurality of IDs to extract algorism. Each of the plurality of IDs is configured from a bit sequence, and the bit sequence is formed by expressing a current time instant as a bit sequence and concatenating a few bits from the first of the bit... Agent: Dickstein Shapiro LLP
20090034719 - Des hardware throughput for short operations: A symmetric key cryptographic method is provided for short operations. The method includes batching a plurality of operation parameters (1503), and performing an operation according to a corresponding operation parameter (1505). The symmetric key cryptographic method is a Data Encryption Standard (DES) method. The short operations can be less than... Agent: Frank Chau, Esq. F. Chau & Associates, LLP
20090034718 - Encryption apparatus and method therefor: A modified implementation of the Kasumi algorithm executes on a 32-bit processor using full 32-bit operations. The implementation comprises a series of four rounds, each round including an intermediate sub-function executed between two executions of an FL sub-function. The intermediate sub-function is functionally equivalent to two consecutive 16-bit FO sub-functions.... Agent: Freescale Semiconductor, Inc. Law Department
20090034720 - Method of countering side-channel attacks on elliptic curve cryptosystem: A method of countering side-channel attacks on an elliptic curve cryptosystem (ECC) is provided. The method comprises extending a definition field of an elliptic curve of the ECC to an extension ring in a first field; generating a temporary ciphertext in the extension ring and countering attacks on the ECC;... Agent: F. Chau & Associates, LLC
20090034721 - Encrypting and decrypting a data stream: The present invention provides methods, systems and apparatus for encrypting and for decrypting a data stream, for securely sending a data stream and for securely receiving a data stream, and for secure transmission of a data stream. The data stream, after at least a part of it being encrypted, is... Agent: Louis Paul Herzberg
20090034722 - Method of encrypting and decrypting data stored on a storage device using an embedded encryption/decryption means: A method of encrypting data is provided that uses a medium key retrieved from a storage medium. The medium key is combined with another key to generate a combination key. Content is encrypted according to the combination key and written to the storage medium.... Agent: Macpherson Kwok Chen & Heid LLP
20090034723 - Image processor, image processing method, and computer program product: In an MFP, an image on an original is read and the image is stored as a document (input image) in an HDD. A marking-information generation module generates marking information (two-dimensional code information) expressing at least one of information relating to storage of the document and an output parameters of... Agent: Harness, Dickey & Pierce, P.L.C
20090034714 - Systems and methods for identity-based encryption and related cryptographic techniques: A method and system for encrypting a first piece of information M to be sent by a sender  to a receiver  allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender  computes an... Agent: Lumen Patent Firm
20090034724 - Masking of data in a calculation: A method and a circuit for ciphering or deciphering data with a key by using at least one variable stored in a storage element and updated by the successive operations, the variable being masked by at least one first random mask applied before use of the key, then unmasked by... Agent: Stmicroelectronics Inc. C/o Wolf, Greenfield & Sacks, P.C.
20090034725 - Method of and system for encryption and authentication: The invention provides a method of and system for networked security, involving multiple clients and servers. Rather than relying on single server based authentication and/or single stream based data transmission, the invention breaks apart information before if leaves the User's computer so that intercepting any single electronic message does not... Agent: Hayes Soloway P.C.
20090034726 - Digital rights management using a triangulating geographic locating device: A method and system for controlling distribution of content within a personal domain that makes use of a determination of the relative proximity to a source device or the geographic locations of the receiving devices. The location information may be determined using a Global Positioning System (GPS) or wireless triangulation... Agent: Connolly Bove Lodge & Hutz LLP
20090034727 - Chaotic spread spectrum communications system receiver: A method is provided for coherently demodulating a chaotic sequence spread spectrum signal at a receiver (104). The method includes receiving a chaotic sequence spread spectrum signal including a plurality of information symbols. The method also includes generating a first string of discrete time chaotic samples. The first string of... Agent: Harris Corporation C/o Darby & Darby PC
20090034728 - Multiplexed multilane hybrid scrambled transmission coding: In one embodiment, a hybrid backplane coding scheme transmits data using lengthy sequences of scrambled data, separated by 8b/10b control character sequences that prepare the receiver for the next scrambled sequence and permit realignment if necessary. Several lanes are coded separately in this manner, and then multiplexed on a common... Agent: James E. Harris
20090034731 - Information processing apparatus and information processing method: In an information processing apparatus, a first communication unit receives encrypted data from a portable terminal device when the portable terminal device is within a first communication range, a second communication unit receives decryption information from the portable terminal device when the portable terminal device is within a second communication... Agent: Harness, Dickey & Pierce, P.L.C
20090034730 - Process for digital signing of a message: A method and apparatus for the digital signing of a message to be signed, the message to be signed is transmitted via a communication network to a mobile radio telephone to be used as a signing unit. A message to be signed is transmitted from a transmitter to a receiver... Agent: Townsend And Townsend And Crew, LLP
20090034729 - Secure message handling on a mobile device: Systems, methods, and software for providing digital security to a child message transmitted from a mobile device to a messaging server, where the mobile device typically does not transmit the parent message with the child message to the messaging server. Whether to apply digital security, such as encryption or a... Agent: Dimock Stratton LLP
20090034735 - Auditing secret key cryptographic operations: In a cryptographic system, the unlocking of secret keys on a user system is audited and correlated with other events that typically occur after the secret key is used to perform a cryptographic operation. Audit evidence of secret key cryptographic operations is recorded for later review and/or analysis, for use... Agent: Townsend And Townsend And Crew, LLP
20090034733 - Management of cryptographic keys for securing stored data: Systems and methods secure data in storage. A management system generates a sequence of keys and an identifier of each key in the sequence. A current key in the sequence and the identifier of the current key are transferred from the management system to a storage system. The storage system... Agent: Hewlett Packard Company
20090034732 - Manufacturing embedded unique keys using a built in random number generator: A method of manufacturing a device containing a key is disclosed. The method generally includes the steps of (A) fabricating a chip comprising a random number generator, a nonvolatile memory and a circuit, (B) applying electrical power to the chip to cause the random number generator to generate a signal... Agent: Lsi Corporation
20090034734 - Multi-level key manager: A cryptographic device and method are disclosed for processing different levels of classified information. A memory caches keys for use in a cryptographic processor. The cryptographic processor requests a key associated with a particular classification level when processing a packet of the particular classification level. The cryptographic device confirms that... Agent: Townsend And Townsend And Crew LLP Viasat, Inc (client #017018)
20090034740 - Certificate-based encryption and public key infrastructure: The present invention provides methods for sending a digital message from a sender to a recipient in a public-key based cryptosystem comprising an authorizer. The authorizer can be a single entity or comprise a hierarchical or distributed entity. The present invention allows communication of messages by an efficient protocol, not... Agent: Macpherson Kwok Chen & Heid LLP
20090034737 - Diamond nanocrystal single-photon source with wavelength converter: A single-photon source (SPS) (10) adapted to output single-photons (P3) at telecommunication wavelengths is disclosed. The SPS includes a color-centered diamond-nanocrystal (CCDN) single-photon source (SPS) (20) adapted to emit input photons (P1) having a wavelength A1 that lies outside of the main telecommunication wavelength bands. A non-linear optical medium (50)... Agent: OpticusIPLaw, PLLC
20090034739 - Key issuing method, group signature system, information processing apparatus, and program: There is provided in accordance with the present invention a key issuing method for being performed by a user apparatus in a group signature system including the user apparatus and an issuer apparatus connected to the user apparatus through a network. The method comprises: reading an issuer public key from... Agent: Dickstein Shapiro LLP
20090034738 - Method and apparatus for securing layer 2 networks: Systems and methods for using a shared key architecture to enable secure Layer 2 meshed network security.... Agent: Triangle Patents, P.l.l.c.
20090034736 - Wireless device authentication and security key management: A method and wireless device for updating at least one cryptographic security key (116) associated with a wireless device (104) and an authentication module (108). An over-the-air programming message comprising security key update information is received (804) from an information processing system (118). The security key update information is processed... Agent: Motorola, Inc.
20090034741 - Asymmetric key wrapping using a symmetric cipher: A method of asymmetric key wrapping in a system is disclosed. The method generally includes the steps of (A) transferring a shared key from a key storage to a cipher operation, wherein the cipher operation comprises a symmetric-key cipher utilizing a cipher key, (B) generating an encrypted key by encrypting... Agent: Christopher P Maiorana, PC Lsi Corporation
20090034742 - Identity-based encryption system: A system is provided that uses identity-based encryption to support secure communications. Messages from a sender to a receiver may be encrypted using the receiver's identity and public parameters that have been generated by a private key generator associated with the receiver. The private key generator associated with the receiver... Agent: Guido Appenzeller
20090034743 - Method for communicating entitlement data from a server, related server, client systems and computer program product: A server communicates a set of entitlement data representative of the entitlement of a client to access corresponding contents data by using a set of keys and a non-invertible cryptographic function. The cryptographic function is applied to a set of candidate bit strings using the set of keys to find... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLPPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.47935 seconds