|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
08/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography August inventions list 08/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 08/26/2010 > patent applications in patent subcategories. inventions list
20100215171 - Transport packet decryption testing in a client device: In a method for testing a transport packet decrypting module of a client device, a first decryption operation of the transport packet decrypting module is implemented on a test encrypted control word using a content decryption key ladder to derive a test control word, a second decryption operation of the... Agent: Motorola, Inc. Law Department
20100215173 - Data security: A system 100 for increasing data security comprises predetermined system data 104 to be protected. A cryptographic unit 108 is used for cryptographic processing of respective blocks of the content data in dependence on respective keys. A key provider 106 determines the respective key used for the processing of a... Agent: Philips Intellectual Property & Standards
20100215174 - Reliable elliptic curve cryptography computation: A method for reliable computation of point additions and point multiplications in an elliptic curve cryptography (ECC) system. Two asymmetric operations are performed: one of the operations is of slightly higher complexity than a conventional ECC operation, and the other operation is of much lower complexity than the first operation.... Agent: Ingrassia Fisher & Lorenz, P.C. (gd)
20100215172 - Sharing a secret with modular inverses: A method and system distributes N shares of a secret among cooperating entities by calculating the multiplicative inverses of the secret. In one embodiment, a distributor selects N distinct prime numbers and forms unique subsets of the prime numbers, with each subset containing K of the N prime numbers (N>=K),... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20100215175 - Methods and systems for stripe blind encryption: Methods and systems are disclosed that relate to encrypting data of a data item for storing in a data storage system comprising a plurality of disks having stripes. A blinding factor is constructed based on a stripe blind that is assigned to a stripe with which the data item is... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100215176 - Means and method for controlling the distribution of unsolicited electronic communications: Methods, devices, and systems for controlling distribution of unsolicited electronic communications such as bulk email or internet telephony telemarketing calls. A first Public Key (56) of a trusted accrediting body (10) is stored in a storage device (50) of a receiver (1), the trusted accrediting body (10) being trusted by... Agent: Christie, Parker & Hale, LLP
20100215177 - System and method for establishing a secure communication link: An enterprise communication system adapted for establishing secure wireless communication sessions, the system comprising: an enterprise platform adapted for establishing communications sessions with one or more wireless devices, and for transmitting signals to and receiving signals from the one or more wireless devices; an platform-side automatic synchronized random key generator... Agent: Ogilvy Renault LLP
20100215178 - Key selection vector, mobile device and method for processing the key selection vector, digital content output device, and revocation list: A key selection vector for a revocation list in an HDCP system as well as a mobile device and a method for processing a key selection vector, a digital content output device using a key selection vector and a revocation list for use in an HDCP system comprising a key... Agent: Warren A. Sklar (soer) Renner, Otto, Boisselle & Sklar, LLP
20100215180 - Replacement of keys: A method and system for assigning a key to a device, the method including providing a device having a processor ID (CID) and an associated processor key (CK) and including a memory, at a first time, storing a personalization data ID (PDID) and associated personalization data (PD) in the memory,... Agent: Husch Blackwell Sanders, LLP Husch Blackwell Sanders LLP Welsh & Katz
20100215179 - Security key method in semiconductor manufacturing: The management of customer security keys by an integrated circuit manufacturer with automated material tracking among multiple circuit testers at multiple sites for programming keys into circuits. Limited key change methods plus sufficient key statuses provides processes for key handling.... Agent: Texas Instruments Incorporated
20100215181 - Method for importing rights object and rights issuer: A method for importing or moving a rights object (RO) is provided, which includes the following steps. A rights issuer (RI) receives a request message of importing or moving an RO to a target device, the request message including key information encapsulated by a public key of the target device;... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP08/19/2010 > patent applications in patent subcategories. inventions list
20100208885 - Cryptographic processing and processors: A method of performing a cryptographic process on data, the cryptographic process treating a quantity of the data as an element of a Galois field GF(λk), where k=rs, the method comprising: isomorphically mapping the element of the Galois field GF(λk) to an s-tuple of elements of a Galois field GF(λ′);... Agent: Greenberg Traurig, LLP
20100208884 - Method and device for hashing onto points of an elliptic curve: Hashing onto elements of a group, in particular onto points of an elliptic curve. An input message is run through a “regular” hashing algorithm, such as e.g. SHA-1 and MD5, and used as a scalar in multiplication with an element of the group. The result is necessarily also an element... Agent: Robert D. Shedd, Patent Operations Thomson Licensing LLC
20100208886 - Method and device for manipulation-proof transmission of data: A method for the manipulation-proof transmission of data from a transmitter to a receiver, a test part being generated in the transmitter from the data using a secret key and communicated together with the data to the receiver, where a verification test part is generated from the received data using... Agent: Kenyon & Kenyon LLP
20100208883 - Protection of a modular exponentiation calculation performed by an integrated circuit: The invention concerns a method and a circuit for protecting a numerical quantity (d) contained in an integrated circuit (1) on a first number of bits (n), in a modular exponentiation computing of a data (M) by said numerical quantity, which consists in: selecting at least one second number (j)... Agent: Stmicroelectronics Inc. C/o Wolf, Greenfield & Sacks, P.C.
20100208887 - Method and device for countering faul attacks: The public exponent e of an RSA key is embedded in a RSA key object that lacks this exponent. During exponentiation, the public exponent e may be extracted and used to verify that the result of the exponentiation is correct. The result is output only if this is the case.... Agent: Robert D. Shedd, Patent Operations Thomson Licensing LLC
20100208890 - Content distribution apparatus, content use apparatus, content distribution system, content distribution method and program: There is provided a content distribution apparatus which includes an encrypting part for encrypting data of each of a plurality of segments divided in content data with a segment key generated from information unique to the segment, and a license generator for generating a license that allows generation of the... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100208888 - Password key derivation system and method: A password-based key derivation function includes a sub-function that gets executed multiple times based on an iteration count. A key derivation module computes the iteration count dynamically with each entered password. The iteration count is computed as a function of the password strength. Specifically, the weaker the password, the higher... Agent: Christie, Parker & Hale, LLP
20100208889 - Two-party storage of encrypted sensitive information: A secure storage system secures information of a client by first encrypting the information with a first key to generate first-key encrypted data. The secure storage system then encrypts with a second key the first-key encrypted data and the first key to generate second-key encrypted data. The system provides the... Agent: Perkins Coie LLP/msft
20100208891 - Method and system for the secure distribution of audiovisual data by transactional marking: A process for distributing a marked audiovisual sequence from a nominal audiovisual sequence towards a receiver, said nominal audiovisual sequence having a nominal content, comprising: generating a marked audiovisual sequence according to a first mark applied to initial content at marking positions; generating a modified stream having a modified content... Agent: Ip Group Of Dla Piper LLP (us)
20100208892 - Methods and devices for digital content protection: Methods and devices for controlling access to digital content. The digital content is split into at least one code part and one scrambled part. A codec of a user device finds that the first part is not scrambled and plays it. The first part comprises code to be retrieved and... Agent: Robert D. Shedd, Patent Operations Thomson Licensing LLC
20100208893 - Apparatus and method for quantum cryptography communication: A quantum cryptography communication apparatus performs quantum cryptography communication between a transmitter and a receiver. The quantum cryptography communication apparatus includes first communicating unit transmitting and receiving a communication signal including relatively strong pulse light between the transmitter and the receiver, and second communicating unit transmitting and receiving a relatively... Agent: Staas & Halsey LLP
20100208894 - Encoder and decoder apparatus and methods: Embodiments provide remote control encoders and decoders, encryption algorithms and methods, singularly and in combination, and not limited thereto.... Agent: Silicon Forest Patent Group Paul J. Fordenbacher
20100208895 - Systems and methods for identity-based encryption and related cryptographic techniques: A method and system for encrypting a first piece of information M to be sent by a sender  to a receiver  allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender  computes an... Agent: Lumen Patent Firm
20100208896 - Communication apparatus and control method thereof: A first communication apparatus that functions as a providing apparatus that provides an encryption key or as a receiving apparatus that receives an encryption key provided by a providing apparatus, and that performs a key sharing process for sharing an encryption key with another apparatus, the first communication apparatus includes:... Agent: Fitzpatrick Cella Harper & Scinto
20100208897 - Communication apparatus, control method thereof, and storage medium: A first communication apparatus that functions as a providing apparatus that provides an encryption key or as a receiving apparatus that receives an encryption key provided by a providing apparatus, and that performs a key sharing process for sharing an encryption key with another apparatus, confirms whether or not the... Agent: Fitzpatrick Cella Harper & Scinto
20100208898 - Managing group keys: In an example, one or more cryptographic keys may be associated with a group. Any member of the group may use the key to encrypt and decrypt information, thereby allowing members of the group to share encrypted information. Domain controllers (DCs) maintain copies of the group's keys. The DCs may... Agent: Microsoft Corporation08/12/2010 > patent applications in patent subcategories. inventions list
20100202607 - Linear predictive coding implementation of digital watermarks: Z-transform calculations may be used to encode (and/or decode) carrier signal independent data (e.g., digital watermarks) to a digital sample stream. Deterministic and non-deterministic components of a digital sample stream signal may be analyzed for the purposes of encoding carrier signal independent data to the digital sample stream. The carrier... Agent: Scott A. Moskowitz
20100202605 - Method of optimizing combinational circuits: A method of simplifying a combinational circuit establishes an initial combinational circuit operable to calculate a set of target signals. A quantity of multiplication operations performed in a first portion of the initial combinational circuit is reduced to create a first, simplified combinational circuit. The first portion includes only multiplication... Agent: Carlson, Gaskey & Olds, P.C.
20100202606 - Two strings private key (symmetric) encryption and decryption method: Two strings encryption algorithm where a long and a short string are used. The byte values of the short string points to a location of the long string and the plaintext is aligned with the long string's location and encryption is performed using the long string's byte values and the... Agent: Louis Ventre Jr
20100202608 - Encryption device, decryption device, and storage device: According to one embodiment, an encryption device uses N extended keys (N: a natural number not less than 2) obtained by extending one encryption key, and includes a first memory, a comparison circuit, a second memory, a selector, and an extension calculator. The first memory stores a flag corresponding to... Agent: Knobbe Martens Olson & Bear LLP
20100202609 - Securing multifactor split key asymmetric crypto keys: Techniques for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions are provided. A first one of multiple factors is stored. All of the factors are under the control of a user and all are required to generate a first private portion... Agent: Alfred A. Stadnicki
20100202610 - Systems and methods for enabling consumption of copy-protected content across multiple devices: Various systems and methods for distributing rights managed content objects arc disclosed. For example, some embodiments of the present invention provide methods for distribution that include providing a mobile storage device that includes a wireless interface and a storage component maintaining a rights managed content object. A first request to... Agent: Hamilton,desanctis & Cha (lsi)
20100202611 - Systems and methods for protecting information: Systems and methods for protecting information provided to an agent via a communication network are provided. In this regard, a representative method comprises, receiving information related to a transaction, wherein the information includes video. Additionally, the method includes initiating a recording of the video and identifying visual content in the... Agent: Setter Roche LLP
20100202612 - Optical network system and method of changing encryption keys: An optical network system including an OLT and ONUs is provided that can prevent the loss of a multicast signal. When receiving an encryption key generation request from the OLT, the ONU generates an encryption key, and transmits the generated encryption key to the OLT. When receiving a notice of... Agent: Antonelli, Terry, Stout & Kraus, LLP
20100202614 - Apparatus and method for ciphering of uplink data in mobile communication system: An apparatus and method for ciphering uplink data in a mobile communication system are provided. The apparatus includes a Radio Network Controller (RNC) for, when receiving a Radio Bearer Setup Complete after a ciphering activation time, determining a Hyper Frame Number (HFN) value of a User Equipment (UE) and changing... Agent: JeffersonIPLaw, LLP
20100202613 - Packet bundling at the pdcp layer with ciphering on the pdcp sdu: Certain aspects of the present disclosure propose techniques for bundling and ciphering service data units (SDU) in the packet data convergence protocol (PDCP) layer. The proposed techniques increase the data rate of the communication system. At the transmitter side, the PDCP layer may bundle SDUs and cipher each SDU individually... Agent: Qualcomm Incorporated
20100202615 - Encryption of voice and data in a single data stream in a deployable,secure communication system: Separate IP data streams, including both voice (VoIP) and data sources, are routed over a single network data stream, encrypted by a single KIV encryption unit, and transmitted as a single packet data stream including both computer and voice data. Integration of the use of a VoIP data stream, together... Agent: Manelli Denision & Selter PLLC
20100202618 - Method and apparatus for updating key in an active state: A method for updating a key in an active state is disclosed according to the embodiments of the present invention. The method includes steps of: initiating a key update by a user equipment in the active state or a network side when a pre-defined condition is met; updating the key... Agent: Leydig, Voit & Mayer, Ltd (for Huawei Technologies Co., Ltd)
20100202616 - Method of securing and authenticating data using micro-certificates: A method of securing wireless communications includes storing a recipient's micro-certificate at a vehicle, a call center, or a certificate authority, transmitting the micro-certificate from its place of storage, extracting the public key from the micro-certificate, encrypting the vehicle communication using the public key, transmitting the encrypted vehicle communication to... Agent: General Motors Corporation C/o Reising Ethington P.C.
20100202617 - System and method for recovery key management: A system and method for managing the recovery key of a computer system is disclosed. The computer system includes a security layer, and the recovery key is stored locally to a memory location on the computer system, including, as examples, flash memory on the motherboard of the computer system or... Agent: Baker Botts L.l.p08/05/2010 > patent applications in patent subcategories. inventions list
20100195819 - Interval centroid based watermark decoder: An interval centroid-based watermark encoder encodes a watermark into a packet flow. Intervals are defined for the packet flow. Some of the intervals are selected as group A intervals while other intervals are selected as group B intervals. Group A and group B intervals are paired and assigned to watermark... Agent: George Mason University Office Of Technology Transfer, Msn 5g5
20100195821 - Apparatus for calculating a result of a scalar multiplication: An apparatus for calculating a result of a scalar multiplication of a reference number with a reference point on an elliptic curve comprises a point selector and a processor. The point selector is configured to select randomly or pseudo-randomly an auxiliary point on the elliptic curve. The processor is configured... Agent: Dickstein Shapiro LLP
20100195820 - Processor instructions for improved aes encryption and decryption: Encrypting information involving the execution of a first instruction and a second instruction on a processor. The first instruction causes the processor to perform an AddRoundKey transformation followed by a ShiftRows transformation. The second instruction causes the processor to perform a ShiftRows transformation followed by a MixColumns transformation. These instructions... Agent: Mhkkg / Globalfoundries
20100195822 - Program converter, encrypting device, and encrypting method: A program converter (1) converts a program (P) which performs arithmetic addition processing to execute encryption, into a converted program (tP) which performs processing equivalent to the processing of the program (P). The program converter (1) includes: a key data extraction unit (10) which extracts key data from the program... Agent: Wenderoth, Lind & Ponack L.L.P.
20100195823 - Radio communication base station device, radio communication mobile station device, method for scrambling response signal in arq: Provided is a radio communication base station device which can prevent damage of ARQ control in an ARQ in which a response signal (ACK/NACK) channel is shared by a plurality of mobile stations. In the device, a repetition unit (106) repeats a response signal inputted from a modulation unit (105)... Agent: Dickinson Wright PLLC James E. Ledbetter, Esq.
20100195824 - Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure: A method and apparatus for dynamically generating data encryption keys for encrypting data files and for decrypting encrypted data files via a key exchange method is provided. A dynamically generated an encryption key is generated for each encryption event, so that the key cannot be produced or reproduced. A key... Agent: Stevens Law Group
20100195825 - Keystroke encryption system: A keyboard encryption system that enables encryption of keystrokes prior to their entry into a remote desktop. An encryption device is attached via a keyboard cable to a keyboard at one end and to a keyboard socket on a computer on the other end. A remote desktop connection allows for... Agent: Kristina M. Grasso Kristina M. Grasso, Esq. PLLC
20100195827 - Method and apparatus for encrypting transport stream of multimedia content, and method and apparatus for decrypting transport stream of multimedia content: A method of transporting an encrypted stream of multimedia content is provided. In the method, when a packet contains data of a predetermined length including selected data from pieces of data corresponding to the multimedia content and a header, key information, and first time information from among pieces of information... Agent: Sughrue Mion, PLLC
20100195826 - System for personal ip broadcasting service with personal drm and method using the same: A system for personal Internet protocol (IP) broadcasting to which a personal digital rights management (DRM) is applied, and a method thereof are provided. The system for personal IP broadcasting includes: a personal broadcasting transmission unit generating content, storing the content, applying personal DRM encryption to the content, and transmitting... Agent: Lahive & Cockfield, LLP Floor 30, Suite 3000
20100195828 - Conditional access system for each transmitter in single frequency network, and a method thereof: The conditional access system in a single frequency network in a digital broadcasting system includes a main broadcasting system transmitting encoded broadcasting signals including a data stream and transmitter identification information (TII) through a main broadcasting network; a repeating system amplifying and transmitting encoded broadcasting signals of the main broadcasting... Agent: Alston & Bird LLP
20100195830 - Electronic data encryption and encrypted data decryption system, and its method: An object of the present invention is to provide an electronic data encryption and decryption system allowing a privileged user to decrypt all encrypted data without using a plurality of secret keys but only by using a single secret key that the privileged user himself has. An electronic data encryption... Agent: Mr. Jackson Chen
20100195829 - Method for establishing a random number for security and encryption, and a communications apparatus: A communications apparatus includes a mobile device. The apparatus includes a receiver for receiving at the mobile device a plurality of signals carrying information including received signals which provides randomly varying data related to location of the mobile device. The apparatus includes a random number generator which generates a random... Agent: Ericsson Inc.
20100195831 - Quantum key distribution system, optical transmitter, optical modulation control circuit, and optical modulation control method: In a quantum cryptographic transmitter (11), a phase modulator (1103, 1104) and an LN intensity modulator (1105) apply optical phase modulation and light intensity modulation to an optical signal based on desired data to generate a desired optical signal to be transmitted to a quantum cryptographic receiver (13). Based on... Agent: Mr. Jackson Chen
20100195832 - Method and a system for transmitting an encrypted control message based on mobile multimedia broadcast: This invention provides a method and a system for transmitting an encrypted control message based on the mobile multimedia broadcast. The said method includes: encapsulating the media data of the program and the encrypted control message in the multiplex sub-frames of the multiplex frame; and setting the encrypted control message... Agent: Oppedahl Patent Law Firm, LLC- China Pat
20100195833 - Telecommunications device security: A mobile terminal for use with a cellular or mobile telecommunications network includes a normal execution environment (operating system) (30) and a secure execution environment (32) comprising a Mobile Trusted Module (MTM). The mobile terminal enables the software of the terminal in the secure execution environment (32) to be updated.... Agent: Workman Nydegger 1000 Eagle Gate Tower
20100195834 - Image generating apparatus, image processing apparatus, image forming apparatus, and recording medium: Additional image data of an additional image, which is based on first data and second data concerning security of obtained data, is added to image data that is based on the obtained data, and an image based on the image data to which the additional image data is added is... Agent: Edwards Angell Palmer & Dodge LLP
20100195835 - Link and physical coding sub-layer protocols: An approach to data communication makes use of a protocol for encoding data on a serial link that provides both a run length limiting function and a frame marking function, while minimizing communication overhead over the data bearing portions of the signal, and while limiting latency introduced into the communication.... Agent: Occhiuti Rohlicek & Tsao, LLPPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.38877 seconds