|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
06/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography June invention type 06/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 06/24/2010 > patent applications in patent subcategories. invention type
20100158241 - Method and apparatus to perform redundant array of independent disks (raid) operations: A method and apparatus to compute a Q syndrome for RAID 6 through the use of AES operations is provided. In an embodiment, the result of GF multiplication performed using the AES operations allows RAID-6 support to be provided without the need for a dedicated RAID controller.... Agent: Intel Corporation C/o Cpa Global
20100158242 - Systems and computer program products for generating and verifying randomized hash values: A system generates a randomized hash value and/or verifies data against a randomized hash value. A hashing circuit can respond to data by randomly selecting a hashing algorithm parameter among a defined set of different hashing algorithm parameters, and by applying a hashing algorithm that uses the selected hashing algorithm... Agent: At&t Legal Department - Mb Attn: Patent Docketing
20100158244 - Communication encryption method for supporting remote monitoring and control system: A communication encryption method for supporting a remote monitoring and control system includes establishing a communication network between a server and a remote host, encrypting a data to be transmitted/received, and testing terminal equipment connected to the remote host. The method includes the steps. The server sequentially partitions a test... Agent: Rabin & Berdo, PC
20100158243 - Method of encryption in networked embedded systems: A data encryption method includes providing a sender node having information to transmit. The information is divided into a sequence of frames. A respective one of a plurality of frame numbers is assigned to each of the frames. At least one nonce and at least one security key are used... Agent: Taft Stettinius & Hollister LLP
20100158245 - Implicit iteration of keyed array symbol: The use of a data structure that is a symbolic representation of a keyed array that has an array variable and an associated key variable. There is a correlation maintained between the variable type of the array variable and the corresponding keying set that is to be bound to the... Agent: Workman Nydegger/microsoft
20100158247 - Method and system for secure storage, transmission and control of cryptographic keys: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key,... Agent: Hewlett-packard Company Intellectual Property Administration
20100158246 - Method for authentication and electronic device for performing the authentication: An authentication method (100) for a secure data transmission is provided, the method comprising performing a first authentication protocol (101) by using a first cipher and performing a second authentication protocol (102) by using a second cipher. Possible inputs for the first authentication protocol (101) may be one shared key... Agent: Nxp, B.v. Nxp Intellectual Property & Licensing
20100158248 - Mobile communications system, next generation core network, and handover method thereof: Data forwarded from forward units (133 and 134) of eNodeBs (113 and 114) is decrypted by encryptor (115) which encrypts data to be transmitted to UE (121) via eNodeBs (113 and 114) of Evolved CN (111) and which is to be transmitted as forwarding data from Evolved CN (111) to... Agent: Sughrue Mion, PLLC
20100158249 - Data transmitting apparatus and data receiving apparatus: Provided is a data communication apparatus which significantly increases time necessary for an eavesdropper to analyze cipher text and which is superior in concealability based on astronomical computational complexity. A multi-level signal, which is generated by using data and key information, has a minor amplitude modulation, which is based on... Agent: Wenderoth, Lind & Ponack L.L.P.
20100158250 - Message transmission method, preferably for an energy distribution network: A process for transmitting a message between a first electronic device and a second electronic device of an energy distribution network is described. The process includes generating, by the first electronic device, a first data encryption key identifying the second electronic device on the basis of a main data encryption... Agent: Seed Intellectual Property Law Group PLLC
20100158251 - Method and apparatus for reducing communication system downtime when configuring a crytographic system of the communication system: Disclosed is a method and apparatus for reducing communication system downtime when enabling cryptographic operation of a cryptographic system of the communication system where the cryptographic system includes a first cryptographic device operatively coupled to a plurality of second cryptographic devices via a communication network of the communication system. The... Agent: Law Offices Of Eugene M. Cummings, P.C.
20100158252 - Polarization coding quantum cryptography system: Provided is a polarization coding quantum cryptography system. The quantum cryptography includes a light source, a quantum channel, an optical path selector, and a path-dependent polarization selector. The light source generates a signal light. The quantum channel is used as a path to transmit the signal light to a receiver... Agent: Rabin & Berdo, PC
20100158253 - System and method for generalized authentication: A system, method, and program product is provided that uses environments to control access to encryption keys. A request for an encryption key and an environment identifier is received. If the encryption key is not associated with the environment identifier, the request is denied. If they are associated, the system... Agent: Lenovo - Jvl C/o Vanleeuwen & Vanleeuwen
20100158254 - Distributed access control for document centric collaborations: Document collaboration may be implemented by executing an access interest specification phase. The access interest specification phase may include receiving access requests from collaboration participants for access to a document instance, the access requests specified using a document schema of the document instance and referencing at least one schema portion... Agent: Brake Hughes Bellermann LLP
20100158255 - Method and system for protecting broadcasting program: Disclosed is a method and system for storing encryption key information and package key information for decrypting encrypted broadcasting programs to store broadcasting programs. The method for protecting broadcasting programs includes generating and storing information about a first encryption key for encrypting broadcasting programs, and generating package key information by... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100158256 - Base station and downlink channel transmission method: Under a sectorized cell architecture in a mobile communication system, a scrambling code applied to multiplication of a transmission signal is selected and switched among different types of downlink physical channels in a unified manner. One of multiple transmission signals to be transmitted on a corresponding one of the different... Agent: Osha Liang L.L.P.06/17/2010 > patent applications in patent subcategories. invention type
20100150340 - Device and method for elliptic curve cryptosystem: An exemplary embodiment of the present invention provides a method and an apparatus for minimizing a difference in data path between elliptic curve point addition and elliptic curve point doubling. An elliptic curve encryption method includes a first operation step of performing point addition for two points when two points... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100150339 - System and device for data encryption and recovery: The present invention provides a flexible encryption device, comprising N encryption units connected in series for encrypting N-bit input data, each one of the N encryption units further comprising an exclusive-OR gate for receiving an input data; and a flip-flop connected coupled to the exclusive-OR gate. Furthermore, the present invention... Agent: Patterson & Sheridan, L.L.P.
20100150341 - Storage security using cryptographic splitting: Methods and systems for securing data in a data storage network are disclosed. One method includes receiving at a secure storage appliance a block of data for storage on a volume, the volume associated with a plurality of shares distributed across a plurality of physical storage devices. The method further... Agent: Unisys Corporation
20100150342 - Encryption and decryption of records in accordance with group access vectors: According to some embodiments, a system, method, means, and/or computer program code are provided to facilitate an appropriate access to secure information by a plurality of users categorized into a plurality of groups. For example, a group access vector may be determined for each of a plurality of records in... Agent: Sap Ag C/o Buckley, Maschoff & Talwalkar LLC
20100150343 - System and method for encrypting data based on cyclic groups: A technique for performing data encryption for a cryptographic system that utilizes a cyclic group having an order is disclosed. The technique involves encoding a secret key into an encoded secret key using an encoding key, where the secret key and the product of the encoding key and the encoded... Agent: Nxp, B.v. Nxp Intellectual Property & Licensing
20100150344 - Methods and devices for a chained encryption mode: An encryption chaining mode takes plaintext block N, generates encryption key N by combining, preferably by XOR, encryption key N−1 and plaintext block N−1 and encrypts plaintext block N using an encryption algorithm with encryption key N to output ciphertext block N. Encryption key for the first plaintext block is... Agent: Robert D. Shedd, Patent Operations Thomson Licensing LLC
20100150345 - Purging of authentication key contexts by base stations on handoff: Various embodiments of methods and apparatuses for managing authentication key contexts are described herein. In various embodiments, the methods and apparatuses include purging an authentication key context of a supplicant after handing off the supplicant, even the authentication key has not expired.... Agent: Schwabe, Williamson & Wyatt, P.C.
20100150346 - Data encryption apparatus, data converting method, data converting program, recording medium and integrated circuit: A data encryption apparatus reduces a hardware gate scale over that of conventional technology which uses substitution tables, and realizes high scrambling performance. The data encryption apparatus includes a data converting unit that splits 256-bit input data into 32-bit data blocks A1, B1, A2, and B2. A first combining unit... Agent: Wenderoth, Lind & Ponack L.L.P.
20100150347 - Communication system and communication method: The present invention relates to a communication system and communication method, an information processing apparatus and method, a device, a program, and a recording medium with which information communication can be performed securely and very conveniently by a simple configuration. In a secret-key storage unit 101 of a reader/writer 100,... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100150348 - Rfid authentication architecture and methods for rfid authentication: A method for mutual authentication in an RFID system comprising an RFID reader and an RFID tag, the method comprising requesting an identification from the tag, receiving the identification, using the received identification to select a password associated with the identification, generating a password key based on the selected password,... Agent: Procopio, Cory, Hargreaves & Savitch LLP
20100150349 - Method and system for performing quantum bit commitment protocol: A method and system for performing a quantum bit commitment protocol is provided. The method of performing a quantum bit commitment protocol to send bit information from a first party to a second party includes a pre-commit phase to randomly select and send, by the second party, a quantum state... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100150350 - Method and apparatus for key expansion to encode data: An encoder according to the present invention embodiments employs a key expansion module to expand an encryption key by using logic and available clock cycles of an encryption process or loop. The key expansion module generates control signals to enable key expansion data to be injected at appropriate times into... Agent: Edell, Shapiro & Finnan, LLC
20100150351 - Method of delivering direct proof private keys to devices using an on-line service: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo-random value... Agent: Trop, Pruner & Hu, P.C.
20100150352 - Secure self managed data (ssmd): A system, according to one embodiment, includes a master key for encryption of data; an encryption key site accessible by computer and storing a first piece of the master key; a configuration file resident in a computer file system, the configuration file storing a second piece of the master key;... Agent: Haynes And Boone, LLPIPSection
20100150353 - Secure method and apparatus to verify personal identity over a network: The present application provides an apparatus and method for verifying a user, via captured biometric characteristics of the user, who is interacting online. The captured biometrics are guaranteed to be captured in real-time, and avoids the possibility of providing biometrics that were previously captured, by sending to the user a... Agent: Scully, Scott, Murphy & Presser, P.C.
20100150354 - Low i/o bandwidth method and system for implementing detection and identification of scrambling codes: A system for detecting and identifying the identity of a base station or cell which transmits a scrambling code is provided. According to one aspect of the system, the system is used to perform scrambling code detection of eight (8) primary cells (each scrambling code's X-component being spaced sixteen (16)... Agent: Nixon Peabody, LLP06/10/2010 > patent applications in patent subcategories. invention type
20100142701 - Efficient full or partial duplicate fork detection and archiving: A method to efficiently detect, store, modify, and recreate fully or partially duplicate file forks is described. During archive creation or modification, sets of fully or partially duplicate forks are detected and a reduced number of transformed forks or fork segments are stored. During archive expansion, one or more forks... Agent: Stainbrook & Stainbrook, LLP
20100142702 - Kasumi cipher executable instructions and circuitry: Logic circuitry and corresponding software instructions for performing functions within the FL function of a Kasumi cipher. An RLAX logic circuit includes a bit-wise AND function, a reorder bus, and a bit-wise exclusive-OR function for generating a destination word from corresponding logic functions of portions of first and second operands,... Agent: Texas Instruments Incorporated
20100142703 - Method, device and system for processing streaming media contents: A method for processing streaming media contents is provided. The method includes: encrypting the streaming media contents and generating corresponding Entitlement Control Message (ECM) and Entitlement Management Message (EMM); and transmitting the encrypted streaming media contents, the ECM and the EMM to a terminal device, in which each I frame... Agent: Leydig, Voit & Mayer, Ltd (for Huawei Technologies Co., Ltd)
20100142704 - Cryptographic encoding and decoding of secret data: Methods and apparatus are provided for cryptographically encoding secret data in a data processing system. The secret data is encoded in accordance with a verifiable encryption process to produce a cryptographic construction (θ) having a decryption constraint dependent on the occurrence of a predetermined event. An event-dependent decryption constraint is... Agent: Ibm Corporation, T.j. Watson Research Center
20100142705 - Cryptographic methods and devices for pseudo-random generation, encrypting data, and cryptographically hashing a message: The invention relates to the general field of digital security and more particularly cryptography. In particular it proposes a device and a method of encrypting a sequence of data. The invention also relates to a cryptographic device (1) and a cryptographic method of generating a pseudo-random data sequence (13) and... Agent: Fitch, Even, Tabin & Flannery
20100142706 - In-line decryption device for securely printing documents: A media content printing method that includes storing encrypted media content data representing media content in a computing device, generating a file of print commands that include the encrypted media content data non-encrypted commands for printing the media content based on the encrypted media content data, and sending the file... Agent: Pitney Bowes Inc.
20100142707 - Data transceiving apparatus and method thereof: A data transceiving apparatus includes a data communicator to set up a communication connection with a counterpart apparatus using a setup message containing encryption information, and a data processor to encrypt data transmitted to the counterpart apparatus or decrypt encrypted data received from the counterpart apparatus using the encryption information.... Agent: Staas & Halsey LLP
20100142708 - Apparatus and method for generating secret key: An apparatus for generating a secret key generates the secret key by using information of a mobile RFID terminal, transmits the generated secret key to an RFID tag attached on an article, and decrypts a unique item identifier of the article encrypted by using the generated secret key after receiving... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100142709 - Rogue access point detection in wireless networks: Methods to detect rogue access points (APs) and prevent unauthorized wireless access to services provided by a communication network are provided. A mobile station (MS) reports to a serving AP the received signal strength (RSS) for all APs in the area it travels. The serving AP detect a rogue AP... Agent: Kramer & Amado, P.C.
20100142710 - Enhanced relational database security through encryption of table indices: A system (108) for securing a database including a first and second tables is provided, where the first table includes a first key field and a first data field and the second table includes a second key field and a second data field. The first and second key fields specifying... Agent: Harris Corporation C/o Fox Rothschild, LLP
20100142711 - Group key management re-registration method: In an embodiment, a fast group key management re-registration is described. One computer-implemented method comprises, at a key server: receiving a registration request from a network element to join a group of network elements managed by the key server; generating and storing a group member registration state comprising information identifying... Agent: Hickman Palermo Truong & Becker, LLP
20100142712 - Content delivery network having downloadable conditional access system with personalization servers for personalizing client devices: A content delivery network and method employing a Downloadable Conditional Access System (“DCAS”) includes first and second personalization servers. A unit key list having unique keys is segmented into different blocks. Each block is encrypted with a separate transmission key corresponding to that block such that first and second blocks... Agent: Banner & Witcoff , Ltd Attorneys For Client Number 007412
20100142713 - Nearly-stateless key escrow service: Some embodiments provide a system to generate a key pair. During operation, the system can receive a request to generate the key pair, wherein the key pair is generated by a key assigner, and wherein the key pair is associated with a user. Next, the system can determine a secret... Agent: Pvf -- Sun Microsystems Inc. C/o Park, Vaughan & Fleming LLP06/03/2010 > patent applications in patent subcategories. invention type
20100135484 - Hash value calculation apparatus and method thereof: A hash value calculation apparatus, which calculates a hash value of a message, includes: an input unit adapted to input an extended block obtained from a message to be processed; a hash value calculation unit adapted to execute a hash value calculation of the input block and to output a... Agent: Rossi, Kimms & Mcdowell LLP.
20100135485 - System for authenticating objects: A system for authenticating an object is disclosed. The system has a sensing device for sensing coded tags printed on the object. Each coded tags encodes an identity of the object and a signature fragment. An entire signature is encoded in multiple coded tags. The system further has a processor... Agent: Silverbrook Research Pty Ltd
20100135487 - Bundle authentication system and method: There is provided a bundle authentication system and method that can perform network access authentication and authentication at a service request in a next generation network utilizing a Bundled Authentication Key (BAK) generated by using an Extended Master Session Key (EMSK) that is an encryption key generated during access authentication.... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100135486 - Nonlinear feedback mode for block ciphers: Plain text, a secret key and a primitive polynomial that defines a finite field of even characteristic are received. The plain text is divided into a plurality of plain text blocks. For each plain text block of the plurality of plain text blocks other than a first plain text block,... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20100135488 - Svc encryption apparatus and method and contents providing system and method: An SVC encryption apparatus includes: an encoding/encryption unit for performing SVC (Scalable Video Coding) encoding on input data contents and carrying out encryption for data in accordance with a first encryption condition to generate a corresponding SVC bitstream; and a NAL (Network Adaptation Layer) data analysis unit for analyzing NAL... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100135489 - Eliminating plaintext video from external memory: In an embodiment, an integrated circuit comprises a decompressor, an encrypt unit, and an on-chip image buffer coupled to the decompressor and the encrypt unit. The decompressor is configured to receive a compressed video stream, and to reconstruct a first frame of the video stream in the on-chip buffer. The... Agent: Mhkkg, PC/apple, Inc.
20100135490 - Method and apparatus for performing video communication: A method for performing video communication is provided. The method includes: creating and saving a bio key using a user's biological information before first and second terminals perform the video communication; establishing a session, wherein the first terminal requests voice communication with the second terminal; exchanging bio keys saved in... Agent: Sughrue Mion, PLLC
20100135492 - Anti-theft system and method for mobile phone: A mobile phone anti-theft system includes a mobile phone, a SIM card and a real-name card-issuing system. The real-name card-issuing system includes a central processing unit, a first user information storage area, transmission equipment, and a card reader. The SIM card communicates with the central processing unit through the card... Agent: PCe Industry, Inc. Att. Steven Reiss
20100135491 - Authentication method: A method of providing authentication of a mobile device in a telecommunications network comprising the steps of: providing a user defined first password to an authentication server in the communications network; generating a set of security parameters by an authentication server and provisioning the security parameters to a mobile device,... Agent: Nixon & Vanderhye, PC
20100135493 - Method and apparatus for generating pseudo random sequence in broadband wireless communication system: Provided are a method and an apparatus for generating pseudo random sequence to generate pseudo random sequences which have larger sizes and are different from each other in a wireless communication system; a method for generating pseudo random sequence in a wireless communication system, comprising generating a first output sequence,... Agent: H.c. Park & Associates, PLC
20100135494 - Method for aggregating data in a network: A method for aggregating data in a network, particularly in a wireless sensor network, wherein the network (1) includes a plurality of sensor nodes (Ni) to measure data and at least one sink node (S) at which the data measured by the sensor nodes (Ni) are aggregated, and wherein each... Agent: Young & Thompson
20100135495 - Mac layer packet data units for wireless communications: Technologies for wireless communications can include communicating connection information that specifies one or more parameters of a connection between a base station and a wireless device. The connection information can be indicative of one or more of: a station identifier, whether data packets associated with the connection include a cyclic... Agent: Fish & Richardson, PC
20100135496 - Method of modifying secrets included in a cryptographic module, notably in an unprotected environment: The invention relates to a method for modifying a set of secrets in a crypto-graphic module. The cryptographic module ensures that the loading of a secret is either complete or null and void. The module enables a reading of a version number for each secret. The module includes information indicating... Agent: Darby & Darby P.C.
20100135497 - Communication with non-repudiation: Apparatus, systems, and methods may operate to compare a first hashed value of at least a first decryption key, the first decryption key received from a sender, to a second hashed value of at least a second decryption key that has been received as a signed value from a receiver.... Agent: Schwegman, Lundberg & Woessner/novell
20100135499 - Shared key transmission apparatus, automatic teller machine, automatic teller system and method of controlling the automatic teller machine: Provided are a shared key transmission apparatus, an automatic teller machine (ATM), and a controlling method thereof. The shared key transmission apparatus may include: a reception unit receiving, from the ATM, a first cryptogram where a random number is encrypted; a description unit restoring the random number from the first... Agent: Fenwick & West LLPPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130509:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.55463 seconds