|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
05/2009 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography May archived by USPTO category 05/09Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 05/28/2009 > patent applications in patent subcategories. archived by USPTO category
20090136023 - Data encryption method using discrete fractional hadamard transformation: A data encryption method using discrete fractional Hadamard transformation includes the steps of: providing a set of data; processing the data with discrete fractional Hadamard transformation to generate at least one Hadamard matrix, the Hadamard matrix having eigen vectors corresponding to eigen values; selecting order parameters from order vectors of... Agent: Kamrath & Associates P.A.
20090136022 - Method and apparatus for calculating a polynomial multiplication, in particular for elliptic curve cryptography: Safeguarding communication channels is required in particular in wireless networks. The use of encryption mechanisms in the form of software is limited by the required calculation and energy capacities of mobile terminals. Costs are of significance when using hardware solutions for cryptographic operations. The present invention provides an approach which... Agent: Ware Fressola Van Der Sluys & Adolphson, LLP
20090136024 - Sharing a secret using polynomials: A method and system for distributing n shares of a secret to n computing systems, and a method and system for reconstructing the secret from k shares of the secret. In one embodiment, the method for distributing the secret comprises representing the secret as a first polynomial over GF(2). The... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20090136025 - Method for scalarly multiplying points on an elliptic curve: A method performs scalar multiplication of points on an elliptic curve by a finite expandable field K of a first field Fp of a p>3 characteristic, wherein said characteristic p has low Hamming weight and the expandable field has a polynomF(X)+Xd−2 of order d in the polynomial representation thereof.... Agent: Staas & Halsey LLP
20090136026 - Watermark embedding using look-up tables: The invention relates to embedding a spread spectrum watermark in a data signal as well as to detection of the embedded watermark. A data signal (4) is encrypted (15) or received in the form of an encrypted data signal (9), the signal being encrypted by modifying (3) it in accordance... Agent: Philips Intellectual Property & Standards
20090136027 - Providing secure communications for active rfid tags: Described herein in an example embodiment, is a mechanism to distribute and implement secure credentials on a WLAN (wireless local area network) employing radio frequency identification (RFID) tags. Symmetric keys are provisioned to the tag in a manner that allows for optimized re-association and secure announcements. The provisioned keys are... Agent: Tucker Ellis & West LLP
20090136028 - Secure content distribution apparatus, systems, and methods: Various embodiments facilitate program content access management. One embodiment is a system with a secure content provider communicatively coupled to a first system and a second system, operable to stream encrypted content over the first system, and operable to communicate access control information over the second system; and a receiving... Agent: Seed Intellectual Property Law Group PLLC
20090136029 - System and method for controlling display of copy-never content: A method and system for controlling the use of unauthorized content, and specifically for controlling the display of content that is marked as “copy-never.” A compliant signal source transmits a video signal along with a secure timestamp to a compliant display device. The compliant display device determines whether the video... Agent: Connolly Bove Lodge & Hutz LLP
20090136031 - Method for protecting content and method for processing information: Disclosed are a method of protecting content and a method of processing information. The method of protecting content can include service related information including revocation application information of content from the outside by employing a content management and protection system, and apply or not apply a content revocation process on... Agent: Fish & Richardson P.C.
20090136030 - Video monitoring system with video signal encrypted and the and method for the same: Techniques pertaining to a security system are disclosed. According to one aspect of the techniques, secured communication of video data between a monitoring system including a monitoring camera and a monitoring terminal is established by encrypting the video data. The monitoring camera is configured to encrypt digital image data before... Agent: Silicon Valley Patent Agency
20090136032 - Image reading apparatus and image forming apparatus: An image reading apparatus includes: an original reading section reading an image from an original and generating image data on the read image; a key generation section generating a key for encrypting on the basis of the image data generated by the original reading section; an encrypting section encrypting the... Agent: Casella & Hespos
20090136033 - Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment: A method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment. The method allows peers using their own personal agents to obtain reputation information of each other through a pair of trustworthy mediator proxies. A mediator proxy is considered trustworthy if even when it is compromised it... Agent: Hiscock & Barclay, LLP
20090136034 - Scrambling sequence generation in a communication system: Techniques for performing scrambling and descrambling in a communication system are described. In an aspect, different scrambling sequences for different channels and signals may be generated based on different cyclic shifts of a base scrambling sequence, which may be a maximal-length sequence. A scrambling sequence for a given channel may... Agent: Qualcomm Incorporated
20090136035 - Public key infrastructure-based bluetooth smart-key system and operating method thereof: A public key infrastructure (PKI)-based Bluetooth smart-key system and operating method thereof. The system includes a locking device and a mobile communication terminal. The locking device enables Bluetooth communication and enables PKI-based data transmission. The mobile communication terminal embedded with a Bluetooth module performs a remote unlocking or keyless entry... Agent: Docket Clerk
20090136036 - Communication method for executing handover, and base station apparatus, terminal apparatus and control apparatus using the communication method: A receiving unit receives a handover request from a terminal apparatus. As the handover request is received, a requesting unit requests a control apparatus connected via a network that an encryption key used for wireless communication performed between the terminal apparatus and a handover source base station apparatus be outputted.... Agent: Mcdermott Will & Emery LLP
20090136037 - Base station device and mobile station device: There are provided a base station device transmitting a frame capable of performing cell search without being affected by arrangement of a pilot channel and a mobile station device performing cell search by using the frame. In the base station device (100), a frame formation unit (120) forms a frame... Agent: Dickinson Wright PLLC James E. Ledbetter, Esq.
20090136038 - Apparatus for receiving encrypted digital data and cryptographic key storage unit thereof: An apparatus for receiving encrypted digital data is provided. The apparatus includes a decryption circuit, a controller, an NVM, and a one-way device. The decryption circuit receives a piece of encrypted digital data and decrypts the encrypted digital data into a piece of decrypted digital data. The controller is coupled... Agent: J C Patents, Inc.
20090136040 - Information processing apparatus and information processing method: Encrypted text data c1 generated by encrypting plaintext data using an encryption key, verification data having a size smaller than the encrypted text data c1, and encrypted text data c2 generated by encrypting the verification data using the encryption key are acquired (S601). It is checked if a decryption result... Agent: Fitzpatrick Cella Harper & Scinto
20090136039 - System and method of restricting recording of contents using device key of content playback device: The present invention relates to a system and method for restricting recording of contents using a device key of a content reproduction device. A content recording device includes a content recording unit for encrypting contents using a Content Encryption Key (CEK) and recording the encrypted contents in a recording medium;... Agent: Dla Piper LLP Us
20090136041 - Secure information storage system and method: The present invention systems and methods facilitate secure communication of information between devices. A present invention system and method can enable secure communication of proprietary content in a HDCP compliant configuration. In one embodiment, a high definition content protection key secure management method is utilized to enable efficient and secure... Agent: Murabito Hao & Barnes LLP
20090136042 - Application layer authorization token and method: An authorization token may provide security for operations. The authorization token may be encrypted by a key manager of a head end system so that only a target device may decrypt the authorization token and perform an operation.... Agent: King And Spalding LLP (trilliant) Trilliant Customer Number
20090136043 - Method and apparatus for performing key management and key distribution in wireless networks: A method and apparatus are provided that enable a common key distribution and management system to be used for distributing and managing the keys that are used for authenticating, authorizing and ciphering exchanges between a wireless device and an ANP and that are used for authentication, authorizing and ciphering exchanges... Agent: Motorola, Inc. Law Department05/21/2009 > patent applications in patent subcategories. archived by USPTO category
20090129586 - Cryptographic module management apparatus, method, and program: A cryptographic module management apparatus searches for cryptographic module meta-information based on the category information of a requested cryptographic module and, if associated cryptographic module category information is contained in this cryptographic module meta-information, searches for the cryptographic module meta-information of an associated cryptographic module, to generate composite type cryptographic... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, P.C.
20090129585 - Exclusive encryption system: An encryption system includes a plurality of encryption operations including individual encryption operations and group encryption operations available for application in the encryption of data. The plurality of encryption operations are selected from the group consisting of functional variance, functional alignment, mathematical offset, wide XOR function, short logical rotation, long... Agent: Welsh & Flaxman LLC
20090129588 - Information processing apparatus: An information processing apparatus capable of effectively preventing unauthorized use of content distributed through a network when playing the content. The information processing apparatus includes a tamper-resistant secure module, a receiving block, and a playback block. The secure module includes a key storage block for storing a decryption key, a... Agent: Staas & Halsey LLP
20090129587 - Method, system and apparatus for sharing media content in a private network: A method, system and apparatus for sharing media content securely and reliably among various computing devices in a private network through media streaming technology is provided. According to the invention, a media streaming apparatus is installed on each computing device, said media streaming apparatus comprises: a controller for controlling a... Agent: Ibm Corporation
20090129589 - Security system and method for use in network: A security system, method and device for use in a network for providing a real-time stream are provided. A server updates security association of a terminal device by periodically providing a key stream. When the key stream for changing the security association of the terminal device is received from the... Agent: JeffersonIPLaw, LLP
20090129590 - Common key generation system, common key generation method and node using the same: First and second nodes generate numeric string elements from time interval by their physical changes. The first node generates a basic numeric string from the numeric string elements and similar numeric strings, encrypts the generated basic numeric string and the similar numeric strings, and generates a cipher value list that... Agent: Mots Law, PLLC
20090129591 - Techniques for securing document content in print and electronic form: A technique for securing selected document content includes receiving, at a printer, an unsecured electronic document. Selected content of the electronic document is then encrypted, with an encryption key, at the printer. A paper document whose content includes the encrypted selected content of the electronic document is then printed. The... Agent: Dillon & Yudell LLP
20090129592 - Method of forming a securitized image: There is disclosed a method of forming a securitized image comprising: obtaining a host image which is to be visible to an observer, obtaining a latent image to be concealed within the host image, adjusting the saturation of regions of at least one of the host image and the latent... Agent: Ladas & Parry
20090129593 - Semiconductor device and method for operating the same: It is an object of the present invention to provide a wireless chip in which a hardware thereof is not required to be modified in each time that encryption algorithm with higher security is developed. In a wireless chip, a circuit capable of communicating information by wireless communication, a CPU,... Agent: Eric Robinson
20090129594 - System and method for providing a trusted network facilitating inter-process communications via an e-box: A system and methods for providing a trusted network which facilitates inter-process communication in accordance with an aspect of the present invention. The system includes processes, a security device, a network security element, a communication path and an outside server. A method for enabling inter-process communication commences when one processes... Agent: Bruce B. Brunda Stetina Brunda Garred 7 Brucker
20090129598 - Microprocessor locking circuit and locking method therefor with locking function: A microprocessor locking circuit for use in a microprocessor comprising at least one program code is provided. The microprocessor locking circuit includes a predetermined key, wherein the microprocessor locking circuit receives an input key and compares the input key with the predetermined key after a reset period starts, wherein the... Agent: Haverstock & Owens LLP
20090129597 - Remote provisioning utilizing device identifier: Embodiments of the present invention provide for remote provisioning using a device identifier. In some embodiments, a client device may transmit the device identifier to a provisioning server and, sometime after an association of the device identifier and the client device has been authenticated, receive an operating system boot image... Agent: Schwabe, Williamson & Wyatt, P.C.
20090129596 - System and method for controlling comments in a collaborative document: A system, method, and program product is provided that operates when opening a word processing document that includes document content inserted at various insertion points within the document. The document is opened by a user that corresponds to a particular user identifier. The comments included in the document include recipient... Agent: Ibm Corporation- Austin (jvl) C/o Van Leeuwen & Van Leeuwen
20090129595 - Verification of a product identifier: A system and method for enabling the verification of the authenticity of a product identification circuit, wherein the checking is based on an encryption key (11) stored to the product identification circuit (10). The encryption key has been stored to the product identification circuit so that one cannot read it... Agent: Squire, Sanders & Dempsey L.L.P.
20090129599 - Hierarchical deterministic pairwise key predistribution scheme: A security system for a hierarchical network (10) includes L hierarchical levels each corresponding to a security domain level (16), and a plurality of local network nodes (A, B, . . . , Z). A keying material generator (24) generates a set (30) of correlated keying material for each network... Agent: Philips Intellectual Property & Standards
20090129600 - Apparatus and method for a direct anonymous attestation scheme from short-group signatures: An apparatus and method is provided for a direct anonymous attestation scheme from short-group signatures. The method may include the creation of a group public/private key pair for a trusted membership group defined by an issuer; and assigning a cryptographic pair that is combined with a unique private member value... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP05/14/2009 > patent applications in patent subcategories. archived by USPTO category
20090122979 - Method and apparatus for protecting pattern recognition data: Provided is a data protection technique that converts original data into a secure form so that even if data registered to a system or database is leaked, information relating to original data cannot be exposed from the leaked data. Accordingly, a method of generating a template for protecting data is... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20090122978 - Method and system for obfuscating a cryptographic function: In a system 300, a server 310 provides a cryptographic function F to an execution device in an obfuscated form. The function F composes output of a plurality of the mapping tables Ti(0≦i≦n; n≧1) using an Abelian group operator . A processor 312 chooses tables O and C such that... Agent: Philips Intellectual Property & Standards
20090122980 - Cryptographic method for securely implementing an exponentiation, and an associated component: An asymmetrical cryptographic method applied to a message M includes a private operation of signing or decrypting the message M to obtain a signed or decrypted message s. The private operation is based on at least one modular exponentiation EM in the form EM=MA mod B, A and B being... Agent: Buchanan, Ingersoll & Rooney PC
20090122981 - Encryption key generation device: A scramble key generation unit generates scramble keys (individual encryption keys) which are different from one another and which are for encrypting and decrypting distributing data, by subjecting a predetermined initial encryption key at least once to a unidirectional reverse replacement and at least once to a trapdoor-equipped unidirectional replacement.... Agent: Harness, Dickey & Pierce, P.L.C
20090122982 - System, method and computer program product for providing digital rights management of protected content: A system for providing digital rights management of protected content includes a client and a DRM manager. The client is capable of receiving at least one piece of content, the piece(s) of content being encrypted with at least one encryption key regardless of client user(s) authorized to access the piece(s)... Agent: Merchant & Gould PC
20090122983 - Image forming apparatus, computer readable medium and medium: The image forming apparatus includes: a random number information generation part that generates random number information; a first encryption part that encrypts the random number information generated by the random number information generation part with using a first encryption key; a second encryption key generation part that newly generates a... Agent: Sughrue Mion, PLLC
20090122984 - Secure mobile telephony: An system for and method of providing end-to-end encrypted real-time phone calls using a commodity mobile phone and without requiring service provider cooperation is presented. The system and method improve upon prior art techniques by omitting any requirement for mobile phones that are specially manufactured to include end-to-end encryption functionality.... Agent: Hunton & Williams LLP Intellectual Property Department
20090122985 - Distribution of group cryptography material in a mobile ip environment: In one embodiment, a Home Agent receives a Mobile IP registration request from a group member, where the group member is a Mobile Node. The Home Agent generates a mobility binding for the group member that associates the group member with a care-of address, wherein the group member is a... Agent: Weaver Austin Villeneuve & Sampson LLP
20090122986 - Systems and methods for preventing transmitted cryptographic parameters from compromising privacy: A method for secure cryptographic communication comprises transmitting information that identifies a group key from a first device to a second device. The method further comprises, in the first device, using the group key to encrypt an input vector, transmitting the encrypted input vector, encrypting privacy-sensitive information using a device... Agent: Baker & Mckenzie LLP Patent Department
20090122987 - Enhanced transmission systems for use in wireless personal area networks: Method and computer program products for enhancing wireless communication in a wireless network are disclosed. In the wireless network, frames of data are transmitted in bursts. Wireless communication is enhanced by transmitting a first frame of source data that is scrambled using a scrambling sequence in a first burst, storing... Agent: Ratnerprestia
20090122988 - Method and apparatus for securely registering hardware and/or software components in a computer system: A system that securely registers components in a first system is presented. During operation, the first system receives a request from an intermediary system to obtain configuration information related to the components in the first system. In response to the request, the first system: (1) encrypts configuration information for the... Agent: Pvf -- Sun Microsystems Inc. C/o Park, Vaughan & Fleming LLP
20090122991 - Method and apparatus for providing encrypted key based on drm type of host device: A method and apparatus for providing an encrypted key based on a DRM type of a host device are provided. The method includes receiving available DRM type information of a host device, making a request for generation of a key object based on the received available DRM type information, and... Agent: Sughrue Mion, PLLC
20090122990 - Network mobility over a multi-path virtual private network: Methods and apparatus for applying a single virtual private network (VPN) address to tunnels or connections associated with different access interfaces are disclosed. In one embodiment, a method includes establishing a first tunnel between a node and a VPN server. The first tunnel has a first address. The method also... Agent: Cisco Systems, Inc. Scientific-atlanta, Inc.
20090122989 - Smart storage device: A smart storage device can have a smart-card portion with access control circuitry and integrated memory, a controller in selective communication with the smart-card portion, and a memory device in communication with the controller. The memory device can be separate from the smart-card portion and can store one or more... Agent: Leffert Jay & Polglaze, P.A.
20090122992 - Method and apparatus for encrypting encoded audio signal: Advanced solutions for encrypting multi-layer audio data are required, ie. audio data that comprise a base layer and one or more enhancement layers. A method for encrypting such an encoded audio signal comprises separating the base layer into two sections, encrypting the side information within frames of the second section... Agent: Robert D. Shedd Thomson Licensing LLC05/07/2009 > patent applications in patent subcategories. archived by USPTO category
20090116640 - Distributed search methods for time-shifted and live peer-to-peer video streaming: Systems, devices and methods for supporting live and time-shifted video streaming via distributed search methods for registering and locating cached portions of video streams shared in peer-to-peer systems.... Agent: Michael Blaine Brooks, PC
20090116641 - Access control key management in a virtual world: Access control key management in a virtual world that includes generating a key for access to a virtual space, a service, an event, or an item in a virtual world, assigning one or more parameters to the key, providing the key to an avatar in the virtual world, and accessing... Agent: Moore & Van Allen, PLLC For Ibm
20090116642 - Method and device for generating local interface key: A method for generating a local interface key includes: generating a variable parameter; and deriving the local interface key, according to the variable parameter generated and related parameters for calculating the local interface key. The method simplifies the process in which the terminal obtains the local interface key and the... Agent: Leydig, Voit & Mayer, Ltd (for Huawei Technologies Co., Ltd)
20090116643 - Encryption apparatus, decryption apparatus, and cryptography system: Provided is a technology with which an electronic document including a plurality of elements such as texts and images may be partially encrypt and decrypt. An encryption-processing control unit receives a selection of electronic data included in an electronic document and a selection of an encryption key for encrypting the... Agent: Mcdermott Will & Emery LLP
20090116644 - System and method for masking arbitrary boolean functions: A method and system for protecting an arbitrary Boolean function of arbitrary number of variables, N, including in a computing device, if N=1, protecting one or more definitions of the arbitrary Boolean function by applying a predetermined masking algorithm, if N>1, reiteratively defining the arbitrary Boolean function of number of... Agent: Empk & Shiloh, LLP C/o Landon Ip, Inc.
20090116645 - File sharing method and system using encryption and decryption: Disclosed is a file sharing method and system using encryption and decryption. A client hashes keywords related to files using a symmetric key algorithm, and encodes the hashed keywords. Then, the client encodes the files using the hashed keywords, and uploads to a file sharing server a ciphertext D including... Agent: Ladas & Parry LLP
20090116646 - Integrity protection of streamed content: The invention relates to a method, a system, an electronic device and a computer program for providing at least one content stream to an electronic device applying Digital Rights Management (DRM). In the method a master integrity key is obtained in a streaming node. An encrypted master integrity key is... Agent: Ware Fressola Van Der Sluys & Adolphson, LLP
20090116647 - Method for providing fast secure handoff in a wireless mesh network: Disclosed is a method for providing fast secure handoff in a wireless mesh network. The method comprises configuring multiple first level key holders (R0KHs) within a radio access network to which supplicants within the multi-hop wireless mesh network are capable of establishing a security association, configuring a common mobility domain... Agent: Motorola, Inc
20090116649 - Revocation of a system administrator in an encrypted file system: A method of securely storing electronic information includes a step in which target electronically stored information is encrypted with a first encryption key and then partitioned into a first set of encrypted ESI partitions a subset of which is able to reconstruct the unpartitioned encrypted ESI. This first set of... Agent: Brooks Kushman P.C. / Sun / Stk
20090116648 - Key production system: A key production system to determine a cryptographic key for a selected cryptoperiod being later than or equal to a cryptoperiod-A, and earlier than or equal to a different cryptoperiod-B, the system including a first receiver to receive a first key-component, associated with cryptoperiod-A, forming part of a first hash-chain... Agent: Husch Blackwell Sanders, LLP Husch Blackwell Sanders LLP Welsh & Katz
20090116651 - Method and system for generating and distributing mobile ip key: A method and system for generating and distributing a mobile IP key are provided. The method mainly includes the following steps. During the course of access validation or re-authorization and re-authentication, a sub-key between a mobile node (MN) and an authentication, authorization, and accounting (AAA) server is computed, and an... Agent: Leydig, Voit & Mayer, Ltd (for Huawei Technologies Co., Ltd)
20090116650 - Method and system for transferring information to a device: Methods and systems for transferring information to a device include assigning a unique identifier to a device and generating a unique key for the device. The device is located at a first site, and the unique identifier is sent from the device to a second site. The unique key is... Agent: Dicke, Billig & CzajaPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.37881 seconds