|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
05/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography May archived by USPTO category 05/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 05/27/2010 > patent applications in patent subcategories. archived by USPTO category
20100128869 - Method and device for executing a cryptographic calculation: The invention concerns a method which consists in operating a key generation in an electronic component for a specific cryptographic algorithm; storing in the electronic component a prime number P and generating at least a secret prime number. In one step (a) randomly selecting (11) two integers p1′ et p2′... Agent: Marshall, Gerstein & Borun LLP
20100128870 - Pseudo-random number generation device, program, and method for stream encoding: A pseudorandom number generation apparatus used for a stream cipher comprises at least one internal state, a non-linear conversion means that updates numeric data saved in the internal state, and a transposition means that performs only bit transposition for the numeric data, updated by the non-linear conversion means, based on... Agent: Mr. Jackson Chen
20100128874 - Encryption / decryption in parallelized data storage using media associated keys: A method and system to allow encryption/decryption to be performed substantially in parallel using one or more media associated keys. The system has an input buffer to store a plurality of media data from a plurality of media channels. A plurality of cryptographic engines is coupled with the input buffer... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100128873 - Method and device for managing a transmission of keys: The present invention concerns a method and a device for encrypting an encoded scalable enhancement frame sent by an emitter to a receiver, the enhancement frame comprising a plurality of complementary streams ordered in term of quality level, each complementary stream corresponding to a combination of more than one scalability... Agent: Robert D. Shedd, Patent Operations Thomson Licensing LLC
20100128872 - Method and system for securing communications in a metering device: A method and system for securing the communication link between the accounting device and printer of a metering system by authenticating the data being sent via the link utilizing a Nonlinear Feedback Shift Register (NLFSR) based system is provided. A NLFSR is provided in each of the accounting unit and... Agent: Pitney Bowes Inc.
20100128875 - Secure voicemail system and method: A system and method are disclosed in which a secure voicemail repository (50) is arranged to receive calls for a recipient system (20) and record said calls in an encrypted form. The encrypted form is decryptable by a key associated with the handset. On demand, the encrypted form is provided... Agent: Leason Ellis LLP
20100128876 - Method of distributing encoding/decoding program and symmetric key in security domain environment and data divider and data injector therefor: A method of distributing an encoding/decoding program and a symmetric key in a security domain environment, and a device divider and data injector therefor are provided. The method includes selecting, at a highest-level security domain, an encoding/decoding program and a symmetric key to be distributed to a plurality of lower-level... Agent: Ladas & Parry LLP
20100128877 - Systems and methods for providing opportunistic security for physical communication channels: Systems and methods of providing opportunistic security for physical communication channels are disclosed. One disclosed method is for opportunistic secure communication on a main channel between a sender device and a receiver device when an eavesdropper device is listening on an eavesdropper channel. This example method includes transmitting, in a... Agent: Thomas, Kayden, Horstemeyer & Risley, LLP
20100128878 - System and method for providing digital contents service: The present invention relates to a method and system for providing a digital content service that provides packaging content consisting of digital rights management (DRM) content and advertisement content, and is able to use the DRM content for free by watching or listening to the advertisement content, including: generating packaging... Agent: Cha & Reiter, LLC
20100128879 - Flexible management of security for multi-user environments: One embodiment is a method including computing or storing an access control polynomial. Further embodiments include systems and computer readable media including an access control polynomial. Further embodiments, forms, objects, features, advantages, aspects, and benefits shall become apparent from the following description and drawings.... Agent: Krieg Devault LLP05/20/2010 > patent applications in patent subcategories. archived by USPTO category
20100124328 - Extensive ciphertext feedback: Some embodiments of a method and apparatus for encrypting and decrypting data have been presented. In one embodiment, a stream cipher is run in parallel with a block cipher to output a stream of bits with a length equal to a number of ciphertext blocks in an output stream of... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20100124329 - Encrypted communication between printing system components: A system and method of communicating between a first device and a second device are provided. The method includes providing unencrypted data to be transmitted in the first device, encrypting at least a portion of the unencrypted data to be transmitted to form encrypted data, using at least a portion... Agent: Andrew J. Anderson Patent Legal Staff
20100124330 - Secure transmission over satellite phone network: A reach back secure communications terminal includes a modem to satellite interconnect board that captures DTMF tones, demodulates encrypted modem information, and converts both into an ASCII string for presentation to a data port of a satellite phone, allowing out-of-band control of a non-secure satellite system (e.g., AT command control... Agent: Manelli Denison & Selter PLLC
20100124331 - Spectrum authorization and related communications methods and apparatus: Various embodiments relate to wireless communications, and more particularly, to methods and apparatus for authorizing use of spectrum, e.g., through the issuance of spectrum access keys, and/or preventing or discouraging the unauthorized use of licensed spectrum. Peer to peer wireless communications between authorized users of licensed spectrum may involve scrambling/descrambling... Agent: Qualcomm Incorporated
20100124332 - Secure wireless communications: A system includes a sending access point and a receiving access point. The sending access point divides a data stream into sets of packets, encrypts a first set of packets using a first encryption protocol, encrypts a second set of packets using a second encryption protocol, where the second encryption... Agent: Verizon Patent Management Group
20100124333 - System and method for processing encoded messages for exchange with a mobile data communication device: A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message... Agent: Jones Day (rim) - 2n05/13/2010 > patent applications in patent subcategories. archived by USPTO category
20100119057 - Efficient method and apparatus for modular inverses: Methods and apparatus are described for computing modular inverses of odd input values modulo 2N (or modulo xN, for example in some Galois field) to perform a modular multiplication in cryptographic processing systems. In one embodiment an approximation is computed having 2k bits of the modular inverse of the odd... Agent: Intel Corporation C/o Cpa Global
20100119058 - Information processing apparatus, information processing method, and program: There is provided an information processing apparatus according to the invention including a bilinear map selection unit for selecting a bilinear map used for a predetermined operation, a group selection unit for selecting at least two types of groups G1 and G2 used in performing the operation, a determination parameter... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100119059 - Integrated circuit device and data transmission system: An integrated circuit device includes: a reception control unit that receives data from an information processing terminal over a network; a main control unit having a route selection determining unit that controls selection of data to be transmitted to a subsequent system based on information whether data received by the... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100119060 - Receiving apparatus and method for controlling the same: The present invention provides a receiving apparatus including a device key generating unit which generates a device key, a work key generating unit which generates a work key, a device key storing unit which sequentially stores the generated device key, every time the device key is updated, and a recording... Agent: Cowan Liebowitz & Latman P.C. John J Torrente
20100119062 - Device to generate a machine specific identification key: An integrated circuit assembly having monitoring circuitry for observing the internal signals of the system so that its properties are captured. The system properties are manipulated so that they can be used as a pseudo random number and or as the basis number for an encryption key. The monitoring circuitry... Agent: Thomas M. Galgano
20100119063 - Establishing relative identity: There are disclosed a method, computing device, and storage medium for establishing relative identity between a first agent on a first computing device and a second agent on a second computing device. An absolute key and a partial relative key may be generated for the first agent, wherein the absolute... Agent: SocalIPLaw Group LLP
20100119061 - Generating secure private keys for use in a public key communications environment: A private key is generated for use in a public key communications environment, and the private key includes a partial private key and processed biometric data. The partial private key is known to the user, but the processed biometric data is not. The processed biometric data is generated on the... Agent: Heslin Rothenberg Farley & Mesiti P.C.
20100119065 - Method and system for securing data utilizing redundant secure key storage: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted.... Agent: Dimock Stratton LLP/research In Motion Limited
20100119066 - Method and system for securing data utilizing redundant secure key storage: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted.... Agent: Dimock Stratton LLP/research In Motion Limited
20100119064 - Service distribution apparatus and method: A service distribution apparatus and method are provided. The service distribution apparatus includes a service module that provides a plurality of separable services; a storage module that stores group information of service reproduction apparatuses which reproduce the services, and a service control module that distributes requested services to different service... Agent: Sughrue Mion, PLLC
20100119067 - Electronic document encrypting system, decrypting system, program and method: An electronic document encrypting system 200, for accomplishing an object of providing a system capable of distributing an electronic document containing important information with a browsing restriction being set and information with none of the browsing restriction being set without removing the important information, includes: an encryption area extracting unit... Agent: Westerman, Hattori, Daniels & Adrian, LLP
20100119068 - Digital file anti pirating: A digital file system where the files are encrypted and are decrypted for playing by using a specified decryption key. The decryption key can be personalized, e.g., to a machine, to a user, to a location or some other personalization.... Agent: Scott C Harris Law Office Of Scott C Harris, Inc
20100119069 - Network relay device, communication terminal, and encrypted communication method: A time required for actually starting encrypted communication after a trigger of an encrypted communication is shortened. When a key exchanging process is to be applied in order to exchange key information upon encrypting a communication performed between a communication terminal 11 and a gateway device 25, a network relay... Agent: Christensen O'connor Johnson Kindness PLLC
20100119070 - Method and system for mixed symmetric and asymmetric decryption of .zip files: The present invention provides a method of integrating existing strong encryption methods into the processing of a .ZIP file to provide a highly secure data container which provides flexibility in the use of symmetric and asymmetric encryption technology. The present invention adapts the well established .ZIP file format to support... Agent: Mcandrews Held & Malloy, Ltd
20100119071 - Apparatus and method for subcarrier scrambling: A subcarrier scrambling method for use in a transmitter with multiple subcarriers, the transmitter being configured to allocate pilot symbols and data symbols for each of a plurality of resource units (RUs). The method includes: applying, for each of the plurality of RUs, a first intra RU sequence to the... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP05/06/2010 > patent applications in patent subcategories. archived by USPTO category
20100111292 - Aggregate and parallelizable hash function: A hash provides aggregation properties, and allows distributed and/or concurrent processing. In an example, the hash operates on message M, and produces a multiplicative matrix sequence by substituting a 2×2 matrix A for binary ones and substituting a 2×2 matrix B for binary zeros in M. A and B are... Agent: Apple Inc.
20100111296 - Collision-resistant elliptic curve hash functions: Elliptic curve hash functions are provided which do not require a pre-existing hash function, such as that required by the MuHash. The elliptic curve hash functions can be built from scratch and are collision free and can be incremental. In one embodiment, rather than a pre-existing hash function, the identity... Agent: Blake, Cassels & Graydon LLP
20100111293 - Encrypted file with hidden contents: A method for storing data includes encrypting a first file (30) so as to generate a block (32) of encrypted data. The block of the encrypted data is inserted into a second file (34) containing data having a random distribution. The second file, including the block of the encrypted data,... Agent: D. Kligler I.p. Services Ltd
20100111295 - Swap circuit for common key block cipher and encryption/decryption circuit including the same: An encryption/decryption circuit includes a swap circuit for outputting each of text data and initialization vector data which are input from an input terminal to either a first or second output terminal in accordance with one of modes of operation, an encryption/decryption processing unit to which one of the text... Agent: Staas & Halsey LLP
20100111291 - System and a method for generating an interleaved output during a decoding of a data block: A method for generating an interleaved output during a decoding of a data block, the method includes: (i) selecting, in response to a row indicator, a row register and a multiplication factor to provide a selected row register and a selected multiplication factor; wherein the selected multiplication factor is responsive... Agent: Freescale Semiconductor, Inc. Law Department
20100111294 - Verification of movement of items: A method, apparatus and system for verifying a route taken during movement of an RFID tag (4) between different entities of an authorized route. The method comprises: first verification apparatus (10) associated with a first entity using a first private key (68) to provide a first encrypted signature (9) that... Agent: Nixon & Vanderhye, PC
20100111298 - Block cipher decryption apparatus and method: An apparatus and method obtains cipher block chaining mode (CBC) ciphertext blocks that were encrypted using a cipher block chaining encryption method, such a audio or video, and decrypts the CBC ciphertext blocks that were encrypted using the cipher block chaining encryption method using a multistage counter mode (CTR) decryptor... Agent: Advanced Micro Devices, Inc. C/o Vedder Price P.C.
20100111297 - Format-preserving cryptographic systems: Format-preserving encryption and decryption processes are provided. The encryption and decryption processes may use a block cipher. A string that is to be encrypted or decrypted may be converted to a unique binary value. The block cipher may operate on the binary value. If the output of the block cipher... Agent: Treyz Law Group
20100111299 - Data transfer system, data transfer method, data transmission device and data receiving device: A data transfer system. The data transfer system includes a first device and a second device. The first device is configured to encrypt a partial information group of the plurality of information groups and to transfer an encrypted information group to the second device, to generate an omission information group... Agent: Hitachi C/o Wagner Blecher LLP
20100111300 - Server certificate issuing system: In a server certificate issuing system according to the invention, the Web server includes a control panel which configures and manages a Web and a mail. The control panel is loaded with an entry screen generator to input application items for an issuance of a server certificate, password generator for... Agent: Carrier Blackman And Associates
20100111301 - Systems and processes of protection and automatic verification of paper documents against falsification, adulteration and leakage: Protection of documents printed in paper is provided by processes for detection, immediately and clearly, of different types of falsification, adulteration, inclusion and omission. A network accessible system is capable of detecting several fraud aspects. A “Remote Expertise Center” or a remote service data center accessible from and to any... Agent: Holland & Hart, LLP
20100111302 - Digital signal processing method an system employing such method: The present invention relates to a method for transmission of a digital signal from a first unit (2), operating according to a transmission mode, to a second unit (3), operating according to a reception mode, through a transmission channel (4), said first unit carrying out the following steps: (a) division... Agent: Roberts Mlotkowski Safran & Cole, P.C. Intellectual Property Department
20100111303 - Electro-optic waveguide polarisation modulator: An electro-optic waveguide polarisation modulator (20) comprising a waveguide core (4) having first and second faces defining a waveguide core plane, a plurality of primary electrodes (22, 24) arranged at a first side of the waveguide core plane and out of said plane, and at least one secondary electrode (26)... Agent: Nixon & Vanderhye, PC
20100111305 - Photon detector: A photon detection system including a photon detector configured to detect single photons, a signal divider to divide the output signal of the photon detector into a first part and a second part, wherein the first part is substantially identical to the second part, a delay mechanism to delay the... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100111304 - System and method for the secure transmission of binary code by phase-and intensity-coding: The invention relates to a system (EM, RE) for the optical transmission of a binary code. The invention makes it possible to carry out a coding of the hits transmitted in terms of intensity and phase by choosing a first base in which the signals coding the hits are distinguished... Agent: Arent Fox LLP
20100111306 - Security model for a relay network system: According to one general aspect, a method may include acquiring a message. In some embodiments, the method may also include determining if a relay station (RS) is allowed to manipulate portions of the message. In some embodiments, the method may also include, if so, generating a message authentication code (MsgAC)... Agent: Brake Hughes Bellermann LLP
20100111307 - Controlling session keys through in-band signaling: The present invention employs in-band signaling between PTEs to provision and control session keys, which are used by the PTEs for encrypting and decrypting traffic that is carried from one PTE to another over a transport network. In operation, a first PTE will receive incoming traffic from a first edge... Agent: Withrow & Terranova, P.l.l.c.
20100111308 - Key handling in communication systems: In a method for key handling in mobile communication systems, first and second numbers are exchanged between entities of the mobile communication system. The first and second numbers are respectively used only once with respect to the respective system parameters of the communication system and therefore allowing greater security in... Agent: Lerner Greenberg Stemer LLP
20100111309 - Encryption key management system and methods thereof: During execution of BIOS at an information handling system, a processor communicates with the storage controller via a command line protocol (CLP) communications channel. Via the channel, the processor obtains identification information for storage devices associated with the storage controller. The processor communicates the identification information to a key management... Agent: Larson Newman & Abel, LLPPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.32974 seconds