|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
01/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography January recently filed with US Patent Office 01/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 01/28/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100020963 - Method and apparatus for descrambling content: In accordance with one embodiment, a method for securing control words is provided. The method includes receiving scrambled digital content in a descrambler integrated circuit. The method further includes receiving an encrypted control word in the descrambler integrated circuit, decrypting the encrypted control word using a key stored in a... Agent: Blakely Sokoloff Taylor & Zafman LLP
20100020964 - Key generation method using quadratic-hyperbolic curve group: Disclosed is a key generation apparatus which uses a finite commutative group defined by a number-theoretical (or arithmetical) function that can be substituted for the elliptic curve, thereby enabling the computational difficulty equivalent to that of breaking the elliptic curve cryptography. The key generation apparatus comprises a key setting part... Agent: Studebaker & Brackett PC
20100020966 - Method for generating encryption key: The present invention relates to an encryption key generating method ensuring resistance to collusion attacks and achieving reduction in a key length of encryption keys corresponding to respective hierarchies of each scalability. In the encryption key generating method, an encryption key (K2,2) corresponding to data in the lowest hierarchies of... Agent: Mcdermott Will & Emery LLP
20100020965 - Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems: In some embodiments, an apparatus and method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems are described. In one embodiment, a multiplication routine may be pre-computed using a one iteration graph-based multiplication according to an input operand length. Once pre-computed, the multiplication routine may be followed... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100020967 - Http authentication and authorization management: Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include an epoch manager that is used to generate authentication and authorization data that remain valid only for an epoch. The epoch manager can generate an epoch key pair that can be used... Agent: Fish & Richardson P.C.
20100020968 - Protection scheme for aacs keys: A method for protecting a software video player having Advanced Access Content System (AACS) includes reading segments of an encrypted first key from noncontiguous regions of memory, assembling the segments to form the encrypted first key, decrypting the encrypted first key with a second key to form a first key,... Agent: Patent Law Group LLP
20100020969 - Monitoring usage of encrypted broadcast services: Embodiments include a method and system for monitoring usage of an encrypted broadcast service, such as an encrypted television program, in a secure client module such as a SIM card. An encrypted entitlement control message is received from a head-end system via the intermediary of a client device. A service... Agent: Schwegman, Lundberg & Woessner, P.A.
20100020971 - Device and method for a secure transaction: A device comprises a first processor and a second processor. The first processor is connected to a display, a data input arrangement, and a data acquisition device in a first mode of operation. The first mode of operation relates to performing non-secure operations. The second processor is connected to the... Agent: Motorola, Inc.
20100020970 - System and method for camera imaging data channel: A system and method for using cameras to download data to cell phones or other devices as an alternative to CDMA/GPRS, BlueTooth, Infrared or cable connections. The data is encoded as a sequence of images such as 2D bar codes, which can be displayed in any flat panel display, acquired... Agent: 24ip Law Group Usa, PLLC
20100020973 - Transmission device and reception device for ciphering process: In a wireless communication system, a transmission device includes: a generation section configured to encrypt information shared between the transmission device and a reception device using first encryption information which changes in accordance with the sequence information, and to generate encrypted data for the shared information; a transmission section configured... Agent: Myers Wolin, LLC
20100020972 - Wireless mobile device that permits toggling of whether to transmit information contained in sms messages as encrypted or clear text: An exemplary method is implemented by a wireless mobile device that transmits and receives short message system (SMS) text messages. Entered first text to be transmitted as a first SMS text message from the wireless mobile device is accepted and stored by a resident application. A user selectable input is... Agent: Carmen Patti Law Group , LLC
20100020974 - Communication system and method thereof: A communication system for transmitting data of a first mobile station to a second mobile station includes a base station and a relay device. The base station is utilized for configuring an uplink and a downlink of the data to correspond to a first connection ID and a second connection... Agent: North America Intellectual Property Corporation
20100020975 - System and method for electronic data security: A method and related secure communications system. The method includes detecting, by a base station, a mobile device docked with the base station and in response to the detecting, generating at least one encryption key in the base station. The method also includes transmitting the encryption key to the mobile... Agent: Hewlett-packard Company Intellectual Property Administration
20100020976 - method of decryption key switching, a decryption device and a terminal equipment: Embodiments of the present invention disclose a method of key switching for decrypting service data at a terminal, which includes: storing at least two decryption keys at a terminal side for decrypting service data encrypted by network side using a corresponding encryption key, wherein one of the at least two... Agent: Ladas & Parry LLP
20100020977 - Key generation device, key derivation device, encryption device, decryption device, method and program: A key generation device (900) receives therein a public key (901) including a hierarchical element (902), a master key (903) including a secret hierarchical element (911), an identity θ (904), and a random number (905). The key generation device (900) generates two random number elements (906a, 906b) from the random... Agent: Mr. Jackson Chen01/21/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100014656 - Cryptographic method comprising secure modular exponentiation against hidden-channel attacks, cryptoprocessor for implementing the method and associated chip card: A cryptographic method carries out a modular exponentiation of the type C=A<B1> mod N, where A is an operand, B1 is a first exponent, N is a modulus and C is a result. The method includes the steps of masking the operand A by a number s, carrying out a... Agent: Buchanan, Ingersoll & Rooney PC
20100014659 - Cryptographic processing apparatus and cryptographic processing method, and computer program: In extended Feistel type common key block cipher processing, a configuration is realized in which an encryption function and a decryption function are commonly used. In a cryptographic processing configuration to which an extended Feistel structure in which the number of data lines d is set to an integer satisfying... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100014655 - Method and apparatus for generating cryptographic key using biometric data: A method of securely storing and authenticating biometric data against attacks of a third party includes encoding input biometric data, and applying a one-way function to the encoded biometric data. A first exclusive OR operation is performed to the result of the one-way function and a selected secret key. The... Agent: North Star Intellectual Property Law, PC
20100014658 - Method of customizing a security component, notably in an unprotected environment: The invention relates to a method of customizing a security component in an unprotected environment. The method according to embodiments of the invention includes: inserting a first secret K0 into said security component, said insertion implemented in a secure domain under the responsibility of the manufacturer of the security component;... Agent: Darby & Darby P.C.
20100014657 - Privacy preserving social network analysis: A method and a system for privacy-preserving SNA. A plurality of vertices of a first subgraph of a graph is encrypted with a first key of a commutatively encryption scheme. A plurality of vertices of a second subgraph encrypted with a second key of the commutatively encryption scheme are received... Agent: Sap Ag
20100014660 - Downlink scrambling method and base station: A disclosed base station randomizes downlink physical channels in OFDM radio access by scrambling codes suitable for the respective physical channels. The base station includes a base-station-specific scrambling code generating unit configured to generate a base-station-specific scrambling code for randomizing downlink physical channels; a sector-specific orthogonal sequence generating unit configured... Agent: Osha Liang L.L.P.
20100014661 - Apparatus, system, method and computer program product for distributing service information and digital rights for broadcast data: An apparatus, system method and computer program product configured to transmit data over a broadcast network. The data is encrypted and decoded using a decryption key available to terminals in combination with a digital rights object. A media guide is broadcast to the terminals. Information from the media guide is... Agent: Ditthavong Mori & Steiner, P.C.
20100014664 - Cryptographic processing apparatus, cryptographic processing method, and computer program: To realize a common-key block cipher process configuration with increased difficulty of key analysis and improved security. In a configuration for storing in a register an intermediate key generated by using a secret key transformation process and performing a transformation process on the register-stored data to generate a round key,... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100014662 - Method, apparatus and computer program product for providing trusted storage of temporary subscriber data: A method for providing trusted storage of temporary subscriber data may include receiving a value indicative of a temporary identity associated with a device, encrypting the value with a randomly generated encryption key to generate an encrypted value, storing the encrypted value in an identity module in removable communication with... Agent: Alston & Bird LLP
20100014663 - Strengthened public key protocol: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The... Agent: Dowell & Dowell P.C.
20100014665 - Remanufacture of encrypted content using a replicated medium: Embodiments of the invention provide a method for creating a source for remanufacture of encrypted content using a replicated medium. A content encrypting engine obtains a first set of meta data from a multimedia content and stores the first set of meta data in a database. A content encrypting engine... Agent: Wall & Tong , LLP
20100014666 - Method and apparatus for protecting scalable video coding contents: Disclosed are a method and apparatus capable of reducing the computational complexity of encryption and decryption by encrypting only data of scalable video coding contents for each coding layer in terms of temporal, spatial, and SNR scalabilities to provide a service for protected scalable video coding contents, and capable of... Agent: The Webb Law Firm, P.C.
20100014667 - Broadcast receiving apparatus and control method thereof: The present invention provides a broadcast receiving apparatus that receives a broadcast wave containing multiple channels. The apparatus comprises, among other things, a selecting unit that selects a channel from the broadcast wave; a determination unit that determines, for all channels that can be selected by the selecting unit, whether... Agent: Cowan Liebowitz & Latman P.C. John J Torrente
20100014668 - Image data verification program recorded on a recording medium, image data verification method, and image data verification system: An image data verification system for verifying image data using a computer and method are provided. The method includes registering image data of an original and extracting information regarding a part of information forming the original image data. The method also includes generating a feature value of the partial information... Agent: Staas & Halsey LLP
20100014669 - Codec-independent encryption of material that represents stimuli intended for human perception: Processors that encrypt frames of data representing images and sounds, for example, use a first encryption process to encrypt control data that includes selected data from the data frames and use a second encryption process to encrypt non-selected data from the data frames. The first encryption process is responsive to... Agent: Dolby Laboratories Inc.
20100014670 - One-way hash extension for encrypted communication: Various apparatuses, methods and systems for encrypted communication are disclosed herein. For example, some embodiments provide an apparatus for encrypted communication, including a transmitter and a receiver. The transmitter includes a first one-way hash calculator and an encryptor. The encryptor has a code input connected to a hash value output... Agent: Texas Instruments Incorporated
20100014671 - Secure interchip transport interface: Multimedia content or related data is securely transferred between a source device and a sink device in a secure multimedia content delivery device, such as a set-top box, using keys modified by logically combining them with copy control-related bits associated with the data.... Agent: Motorola, Inc. Law Department
20100014672 - Counter initialization, particularly for radio frames: A method for protecting traffic in a radio access network connected to at least two core networks. The method comprises maintaining a corenetwork-specific authentication protocol and a radio-bearer-specific ciphering process, and generating, for each ciphering process, a count parameter comprising a cyclical sequence number and a hyperframe number (HFN) which... Agent: Qualcomm Incorporated
20100014673 - Radio frequency identification (rfid) authentication apparatus having authentication function and method thereof: Disclosed are an RFID authentication apparatus having an authentication function and a method thereof. An RFID authentication method includes determining, by an authentication reader, an AES key using authentication information received from an authentication tag, generating an output key, encrypting a predetermined length of confirmation data by using the output... Agent: Jae Y. Park
20100014674 - Systems and methods for authorization and data transmission for multicast broadcast services: A method for a base station to provide multicast broadcast services (MBSs). The method includes: obtaining an MBS authorization key (MAK); generating a number as an MBS group traffic encryption key (MGTEK); using a service credit number (SCN) to count an amount of service time or MBS content data; generating... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100014675 - Appraising systems with zero knowledge proofs: A system, method, and computer program product are provided for requesting a proof of a security policy in a client system. Additionally, a system, method, and computer program product are provided for proving a security policy to an interrogator system.... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100014676 - Privacy management for tracked devices: A device, method, system and computer readable medium for the protection of private data while permitting the monitoring or tracking of electronic devices that are shared for both business and private purposes.... Agent: Knobbe Martens Olson & Bear LLP
20100014677 - Group subordinate terminal, group managing terminal, server, key updating system, and key updating method therefor: Provided is a group subordinate terminal in a key updating system that includes a server and a group of terminals including: a group managing terminal; and group subordinate terminals including the group subordinate terminal, the group subordinate terminal comprising: a group withdrawal request processing unit which transmits a group withdrawal... Agent: Wenderoth, Lind & Ponack L.L.P.
20100014678 - Cryptographic system using chaotic dynamics: The invention is a cryptographic system using chaotic dynamics. A chaotic system is used to generate a public key and an adjustable back door from a private key. The public key is distributed and can be used in a public key encryption system. The invention can also be used for... Agent: Fish & Richardson P.C.01/14/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100008496 - Encryption and signature schemes using message mappings to reduce the message size: According to some embodiments of the invention, a message is processed before encryption so that the encryption method generates a short ciphertext. The message processing can be viewed as a mapping (610) that maps the message into another message that generates the short ciphertext. The mapping is reversible at least... Agent: Haynes And Boone, LLPIPSection
20100008497 - Stream encryption method and encryption system: A stream encryption method encodes plaintext of N number of 1-bit input, signal sequences into L (L is N or more) bits of encrypted text using N number of pseudo random sequences and uses only one pseudo random sequence used for the encryption to decode the single corresponding plaintext. This... Agent: Arent Fox LLP
20100008498 - Encryption processing apparatus, encryption method, and computer program: A common-key blockcipher processing structure that makes analysis of key more difficult and enhances security and implementation efficiency is realized. In a key scheduling part in an encryption processing apparatus that performs common-key blockcipher processing, a secret key is input to an encryption function including a round function employed in... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100008499 - Method and apparatus for generating random data-encryption keys: One embodiment of the present invention provides a system that facilitates generating random data-encryption keys for data files. During operation, the system receives a command at a computer system to create a data file that may include encrypted data. This data file includes a wrapped data-encryption key to facilitate encrypting... Agent: Pvf -- Oracle International Corporation C/o Park, Vaughan & Fleming LLP
20100008500 - End-user system of preventing unauthorized rerecording of multimedia content: An end-user system for the blocking of recording digital content at during the rendering of encrypted digital multimedia files. Before the process of rendering of encrypted digital multimedia can be started all rendered media stream during playback are opened to ensure that this multimedia content is not recorded. This blocks... Agent: Fleit Gibbons Gutman Bongini & Bianco P.l.
20100008501 - Illegal recording prevention apparatus: An illegal recording prevention apparatus used for preventing an illegal recording with a video camera in a movie theater, comprises a unit for emitting infrared light which has a center wavelength in a wavelength of 800-980 nm wavelength, so that an automatic-focusing regulating function or automatic exposure regulating function of... Agent: Rader Fishman & Grauer PLLC
20100008502 - Content distribution system, content reception terminal, content distribution method and processing method performed when viewing streaming contents: There is provided a system including a plurality of content distribution servers for distributing scrambled contents and streaming-distributing an encrypted scramble key used for releasing the scrambling, a license server for providing a work key for decoding the encrypted scramble key distributed from the predetermined content distribution server, a portal... Agent: Frommer Lawrence & Haug
20100008503 - Secure terminal data loader apparatus and method for a mobile platform: A terminal data loading device on a mobile platform includes a media unit for receiving a transportable media element containing media data and outputting a media signal to a control processor unit. The control processor unit outputs an information signal to a wireline communication unit. The wireline communication unit outputs... Agent: Fish & Associates, PC Robert D. Fish
20100008504 - Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method: The present invention provides a data transmitting apparatus in which a device information obtaining unit obtains device information of a device connected to the data transmitting apparatus; a verification unit verifies validity of a data receiving apparatus, based on the device information obtained by the device information obtaining unit; and... Agent: Lerner, David, Littenberg, Krumholz & Mentlik
20100008506 - Method and apparatus for performing voip-based communication using bio keys: A method for performing an encrypted voice call between a first terminal and a second terminal supporting a Voice over Internet Protocol (VoIP)-based voice call. In the method, the first and second terminals generate and store a bio key using biographical (bio) information of a user in advance before performing... Agent: The Farrell Law Firm, LLP
20100008505 - Secret sharing technique with low overhead information content: An apparatus and method for sharing a secret comprising the steps of generating a first random matrix, generating a first projection matrix from the first random matrix, and determining a first remainder matrix from the first projection matrix and the first secret matrix. The first secret matrix may be determined... Agent: Ratnerprestia
20100008507 - Method for auto-configuration of a network terminal address: A method for generating a network address in a communication network includes at least one user equipment and a network equipment. The method includes: a) providing a same shared secret key both at the at least one user equipment and at the network equipment; and b) generating at least a... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100008508 - Method for establishing a secret key between two nodes in a communication network: A method for establishing a secret key between two nodes in a communication network, in particular in a wireless local area network (WLAN), includes concealment of the fact that a key exchange occurs, one of the nodes—first node (B)—broadcasts one or more packets (Pi) that can be received by the... Agent: Young & Thompson
20100008509 - Communication apparatus, key server, and management server: A communication apparatus obtains file information indicating all or a part of first and second encrypted pieces obtained by encrypting a plurality of pieces constituting a part of a content and version management information with which it is possible to judge whether the file information has validity and receives, for... Agent: Turocy & Watson, LLP
20100008510 - Method and system for secure download of firmware: Firmware is securely downloaded from a host to an information storage device using an encryption key generated by the information storage device. The encryption key is generated in response to a firmware download request by the host. The host encrypts the firmware image with the encryption key and downloads the... Agent: Patterson & Sheridan, L.L.P.01/07/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100002873 - Cipher for disk encryption: Encryption is provided with additional diffusion components to construct a block cipher with a large and variable block size. The cipher incorporates an encryption system or algorithm such that the cipher is at least as secure as the encryption system or algorithm. Additional components of the cipher provide improved diffusion.... Agent: Woodcock Washburn LLP (microsoft Corporation)
20100002872 - Data transformation apparatus, data transformation method, and computer program: A non-linear transformation processing structure having a high implementation efficiency and a high security is realized. Data transformation is performed using a first non-linear transformation part performing non-linear transformation using a plurality of small S-boxes; a linear transformation part receiving all the outputs from the first non-linear transformation part and... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100002871 - Device provided with rewritable circuit, updating system, updating method, updating program and integrated circuit: A problem to be solved is that a conventional device is not equipped with a unit that enables efficient circuit update taking into consideration an unconfigured area in the reconfigurable circuit in the device. A data using device 101 of the present invention transmits, to a design data generation apparatus... Agent: Wenderoth, Lind & Ponack L.L.P.
20100002869 - Encryption circuit and decryption circuit: A CBC encryption circuit, configured with an input register 11, a KEY register 12, an EXOR calculation section 13, an AES encryption calculation section 14, a sector 15, an IV register 16 to hold an initial vector IV and output register 17, is equipped with a counter 22 to count... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100002868 - Method and system for encryption of blocks of data: A method for encryption of blocks of data (201-206) is provided including the steps of: encrypting (301) a block of data using a current random number (211-216) generated for the block of data (201-206); encoding (303) the current random number using one or more of a set of previous random... Agent: Carey, Rodriguez, Greenberg & Paul, LLP Steven M. Greenberg
20100002870 - Partial encryption and full authentication of message blocks: Methods and apparatus are presented for encrypting and authenticating data, wherein some data is encrypted and some data is not encrypted, but all of the data is authenticated. Masking modules (410) are used in a partial-block encryption mode to indicate which bits of a data block are to be encrypted.... Agent: Qualcomm Incorporated
20100002874 - Information processing apparatus and method: The present invention relates to an information apparatus and method suitable for use in upgrading control programs readily by a user. In step S501, a storage area to store an upgraded firmware is determined. In step S502, the upgraded firmware is provided. In step 503, the provided firmware is decrypted... Agent: Wolf Greenfield & Sacks, P.C.
20100002876 - Encryption apparatus, decryption apparatus, licensing apparatus and content data generation method: In order to provide various service types to the users in a case of supplying the contents constituted from multiple resources via broadcast, the following apparatuses are provided. An encryption apparatus (100) encrypts the resources-to-be-encrypted of the contents, stores the encrypted resources in the packets and transmits the packets via... Agent: Morgan Lewis & Bockius LLP
20100002875 - Slice-based prioritized secure video streaming: Slice-based prioritized secure video streaming comprises a transmitter receiving a slice comprising a plurality of macroblocks and selecting an encryption key based at least in part on a relative importance of secure transmission of the macroblocks. If the importance is high, a master key is selected. If the importance is... Agent: Mattingly & Malur, P.C.
20100002877 - Adaptive generation of a pseudo random number generator seed: A seed for use in a cryptographic operation for an electronic device is determined by estimating the number of entropy data bits needed to satisfy a predetermined security strength of the cryptographic operation. The estimation is based on an entropy strength of a string of entropy data bits. Entropy strength... Agent: Motorola, Inc. Law Department
20100002878 - Method for inputting password in mobile terminal: A method for inputting a password in a mobile terminal includes displaying a keypad cryptograph taking a form of a keypad image, in which the symbols arrangement of the input keys in the keypad cryptograph is different from a symbols arrangement of the input keys of a physical keypad of... Agent: PCe Industry, Inc. Att. Steven Reiss
20100002879 - Method and apparatus for reducing communication system downtime when configuring a cryptographic system of the communication system: Disclosed is a method and apparatus for reducing communication system downtime when enabling cryptographic operation of a cryptographic system of the communication system where the cryptographic system includes a first cryptographic device operatively coupled to a plurality of second cryptographic devices via a communication network of the communication system. The... Agent: David M. Mundt Cook, Alex, Mcfarron, Manzo,
20100002880 - System and method for lawful interception using trusted third parties in secure voip communications: Disclosed is a system for lawful interception using a trusted third party in secure VoIP communication. A VoIP transmit terminal generates a secure packet using a master key received from a trusted third party and then communicates with a VoIP receive terminal. A collection device having received a lawful interception... Agent: Charles N. J. Ruggiero Ohlandt, Greeley, Ruggiero & Perle, L.L.P.
20100002881 - Polarization-insensitive one-way quantum key distribution receiver, transmitter/receiver system: Provided are an apparatus for receiving a quantum cryptographic key and an apparatus for transmitting and receiving a quantum cryptographic key at high speed without polarization drift of an optical pulse signal and phase drift of an interferometer. The apparatus for receiving a quantum key includes: a polarization-insensitive optical phase... Agent: Ladas & Parry LLP
20100002883 - Security procedure and apparatus for handover in a 3gpp long term evolution system: A method and apparatus for implementing a security procedure during handover of a wireless transmit/receive unit (WTRU) in wireless communications that controls the behavior of a handover target if it cannot support the required security algorithms. The handover source can detect that the target does not support the required security... Agent: Volpe And Koenig, P.C. Dept. Icc
20100002884 - Optical out-of-band key distribution: One aspect of the disclosure relates to an out-of-band communication system and associated process. The out-of-band communication system includes an encrypted data path that is configured to convey encrypted data. The out-of-band communication system includes an optical out-of-band channel that is physically distinct from the encrypted data path. The encrypted... Agent: Lee & Hayes, PLLC
20100002885 - Efficient multiparty key exchange: A system for providing secure communications includes a telecommunications network. The system includes N nodes and a new node in communication with the network to form a session, where N is greater than or equal to three and is an integer. Each node has media streams, and a unique cryptographic... Agent: Ericsson Inc.Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.41358 seconds