|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
09/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography September class, title,number 09/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 09/30/2010 > patent applications in patent subcategories. class, title,number
20100246808 - Side channel attack tolerance evaluation apparatus, method and program: Provided is a side channel attack tolerance evaluation device capable of evaluating the propriety of the estimation of an encryption algorism, processing timing, and determination of a processing sequence of the encryption algorism using side channel information. The side channel attack tolerance evaluation device, which performs evaluation of tolerance to... Agent: Sughrue Mion, PLLC
20100246810 - Advanced multi-channel watermarking system and method: A method, computer program product, and computing device for modifying a first channel portion of a digital media data file to include at least a first primary watermark. A second channel portion of the digital media data file is modified to include at least a first secondary watermark, wherein the... Agent: Holland & Knight LLP
20100246809 - Information processing system, information processing method, and information processing program: To provide an architecture information processing system having a small circuit size capable of reducing power consumption and cost, on which system a circuit simultaneously executing encryption processing and message authentication (falsification detection processing) can be mounted. An information processing system includes at least: a parameter storage section that retains... Agent: Foley And Lardner LLP Suite 500
20100246813 - Method and system for accelerating the deterministic enciphering of data in a small domain: Conventional block ciphers that traffic in 128-bit block sizes are ill-suited for operating in small domains like credit card numbers. Some embodiments relate to techniques for constructing and speeding up practical and provably secure schemes for deterministically enciphering data from a small domain like credit card numbers using a conventional... Agent: Park, Vaughan & Fleming LLP
20100246812 - Secure similarity verification between encrypted signals: A method for verifying a similarity between a first signal and a second signal is described. The first and the second signals are encrypted homomorphically using a key. First, we acquire a set of error patterns determined by a similarity constraint. Then, each error pattern is homomorphically encrypted using the... Agent: Mitsubishi Electric Research Laboratories, Inc.
20100246811 - Systems and methods for information security using one-time pad: A method of verifying a password and methods of encryption and decryption using a key generated from a one-time pad. In one embodiment, the method of verifying includes: (1) receiving a password attempt, (2) retrieving a pointer from memory, (3) searching a one-time pad based on the pointer to retrieve... Agent: Hitt Gaines P.C.
20100246814 - Apparatus and method for implementing instruction support for the data encryption standard (des) algorithm: A processor including instruction support for implementing the Data Encryption Standard (DES) block cipher algorithm may issue, for execution, programmer-selectable instructions from a defined instruction set architecture (ISA). The processor may include a cryptographic unit that may receive instructions for execution. The instructions include one or more DES instructions defined... Agent: Mhkkg/oracle (sun)
20100246815 - Apparatus and method for implementing instruction support for the kasumi cipher algorithm: A processor including instruction support for implementing the Kasumi block cipher algorithm may issue, for execution, programmer-selectable instructions from a defined instruction set architecture (ISA). The processor may include a cryptographic unit that may receive instructions for execution. The instructions include one or more Kasumi instructions defined within the ISA.... Agent: Mhkkg/oracle (sun)
20100246816 - Data encryption: A system for encryption, and subsequent decryption, of encoded data allows for transcoding of the encrypted data. The data is encoded in such a way that different packets have different importance levels, so that some or all of the packets at the lower importance levels can be discarded or truncated... Agent: Weaver Austin Villeneuve & Sampson LLP
20100246818 - Methods and apparatuses for generating dynamic pairwise master keys: A method to generate a pairwise master key for use in establishing a wireless connection is presented. In one embodiment, the method comprises determining a region in an image. The method further comprises generating the pairwise master key based at least on contents of the region in the image.... Agent: Blakely, Sokoloff, Taylor & Zafman LLP
20100246817 - System for data security using user selectable one-time pad: A method of generating a key, a method of encrypting a message and an encryption/decryption system. In one embodiment, the method of generating the key includes: (1) selecting a common document to serve as a one-time pad, (2) generating a pointer, (3) searching the common document based on the pointer... Agent: Hitt Gaines P.C.
20100246819 - Method to upgrade content encryption: Generation of secret keys is carried out in a smartcard for use by a receiver device's main processor, or alternatively, decryption processing for selectively encrypted content is carried out in the smartcard itself in order to thwart hacking and pirating of protected video content. This abstract is not to be... Agent: Miller Patent Services
20100246820 - Modular broadcast receiver system and method: The construction of a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers is simplified. In a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers, of the function blocks which constitute the receiving apparatus, a block used in common irrespective of the broadcasting... Agent: Lerner, David, Littenberg, Krumholz & Mentlik
20100246821 - Modular broadcast receiver system and method: The construction of a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers is simplified. In a receiving apparatus for receiving a broadcast from a plurality of broadcasting providers, of the function blocks which constitute the receiving apparatus, a block used in common irrespective of the broadcasting... Agent: Lerner, David, Littenberg, Krumholz & Mentlik
20100246822 - Securely providing secret data from a sender to a receiver: The invention provides a system and a method for securely providing a secret data from a sender to one or more receivers. The receiver uses a sequence of functions originating from a hierarchy of functions to migrate the secret data from an input transform space to an output transform space... Agent: Schwegman, Lundberg & Woessner, P.A.
20100246823 - Apparatus and method for address privacy protection in receiver oriented channels: Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input... Agent: Qualcomm Incorporated
20100246824 - Apparatus and method for virtual pairing using an existing wireless connection key: Disclosed is a method for virtual pairing of a first peer device with a second peer device. In the method, a nonce is generated at the first peer device for use in virtually pairing the first and second peer devices to establish a first-type wireless connection. The nonce is forwarded... Agent: Qualcomm Incorporated
20100246825 - Wireless communication method and system for transmission authentication at the physical layer: The subject authentication scheme encompasses a large family of authentication systems which may be built over existing transmission systems. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth. The authentication information (tag signal) is sent concurrently with data (message... Agent: Rosenberg, Klein & Lee
20100246826 - Digital cinema management device and digital cinema management method: A digital cinema management device includes a control unit that manages keys used when exhibiting contents with playback devices and controls a representation of a management window for performing the key management, in which the control unit displays an arrangement representation in the management window and provides a representation at... Agent: Lerner, David, Littenberg, Krumholz & Mentlik
20100246829 - Key generation for networks: Systems, methods, and other embodiments associated with key generation for networks are described. One example method includes configuring a key server with a pseudo-random function (PRF). The key server may provide keying material to gateways. The method may also include controlling the key server to generate a cryptography data structure... Agent: Tucker Ellis & West LLP
20100246828 - Method and system of parallelized data decryption and key generation: A method and system to decrypt data in a particular round of decryption substantially in parallel with the generation of a decryption key associated with the next round of the particular round of decryption. By performing an inverse next key computation, the decryption process can be symmetric to the advanced... Agent: Intel/bstz Blakely Sokoloff Taylor & Zafman LLP
20100246827 - User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store: The claimed subject matter relates to architectures that can construct a hierarchical set of decryption keys for facilitating user-controlled encrypted data storage with diverse accessibility and hosting of that encrypted data. In particular, a root key can be employed to derive a hierarchical set of decryption keys and a corresponding... Agent: Lee & Hayes, PLLC09/23/2010 > patent applications in patent subcategories. class, title,number
20100239086 - System and method for secure transmission of media content: A system that incorporates teachings of the present disclosure may include, for example, a gateway comprising a controller to receive from a communication device a request for media content, receive a key and a record associated with the communications device from an interactive Television (iTV) system, wherein the record comprises... Agent: At&t Legal Department - Gmg Attn: Patent Docketing
20100239087 - Encrypting variable-length passwords to yield fixed-length encrypted passwords: According to one embodiment, encrypting passwords includes performing the following for each input password of a plurality of input passwords to yield encrypted passwords, where at least two input passwords have different lengths and the encrypted passwords have the same length. An input password and a random number are received... Agent: Baker Botts L.L.P.
20100239089 - Method and device for supplying of a data set stored in a database: Method and device for supplying of a data set stored in a database to supply of a data set, e.g. the content of a copy protected audio CD, which is stored in a database, e.g. to a user PC on which said content of a copy protected audio CD cannot... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100239088 - Method and system for digital content protection: Methods, systems and computer program products for copy protecting content data to be stored on storage media are disclosed. At least one location in the content data is selected for insertion of a predetermined data sequence, which, upon re-trieval from the storage media by a data retrieval apparatus, is capable... Agent: Wood, Phillips, Katz, Clark & Mortimer
20100239090 - Delivering secure iptv services to pc platforms: To prevent theft of protected content when IPTV services are provided, a conditional access device (CAD) is connected to a personal computer (PC). An application is launched on the PC from the CAD over universal serial bus (USB) interface. The application configures the PC to allow a user to receive... Agent: Edell, Shapiro & Finnan, LLC
20100239091 - Method for generating masks in a communicating object and corresponding communicating object: The invention relates to a method for generating masks in a communicating object, the masks being intended to mask data to be stored in the communicating object. At least one master mask is stored in the communicating object. According to the invention, the method involves applying at least one diversifier... Agent: Buchanan, Ingersoll & Rooney PC
20100239092 - Methods and systems for communicating over a quantum channel: Alice generates a sequence of key bits forming an initial cryptographic key. Alice then uses the sequence of key bits and a sequence of cipher bits to control respective control parameters of a quantum encoding process applied to a sequence of quantum pulses, where the sequence of cipher bits used... Agent: Smart & Biggar
20100239093 - Data transfer system and data transfer method: In a data transfer system provided with a mobile terminal device, an information processing apparatus, and an authentication server, the mobile terminal device transmits authentication information to the authentication server through a first communication line, the authentication server transmits a predetermined permission code to the mobile terminal device through the... Agent: Squire, Sanders & Dempsey L.L.P.
20100239094 - Computer readable medium storing key generating program, computer readable medium storing key recording program, key generating device, pki card, key recording system, key generating method and key recording method: A computer readable medium stores a program causing a computer to execute a key generating processing. The computer generates a signatory private key which is used in an electronic signature, a signatory public key, a signatory public key certificate, a certification public key which is used when recording the signatory... Agent: Sughrue Mion, PLLC
20100239095 - Key distribution: Methods and systems are provided for trusted key distribution. A key distribution or an identity service acts as an intermediary between participants to a secure network. The service provisions and manages the distribution of keys. The keys are used for encrypting communications occurring within the secure network.... Agent: Schwegman, Lundberg, Woessner & Kluth, P.A.09/16/2010 > patent applications in patent subcategories. class, title,number
20100232601 - Elliptic curve arithmetic processing unit and elliptic curve arithmetic processing program and method: An apparatus for executing cryptographic calculation on the basis of an elliptic point on an elliptic curve includes: a memory for storing a first value including a plurality of digits; and a processor for executing a process including: obtaining a second value representing a point on the elliptic curve; calculating... Agent: Staas & Halsey LLP
20100232597 - Encryption and decryption processing method, system and computer-accessible medium for achieving sms4 cryptographic procedure: An encryption and decryption processing method of achieving SMS4 cryptographic algorithm and a system thereof are disclosed. Firstly, the method prepares constant arrays, inputs the external data into a data registering unit and deals with the first data conversion; secondly, deals with the second data conversion; thirdly, repeats the second... Agent: Dorsey & Whitney LLP Intellectual Property Department
20100232602 - Encryption processing apparatus: Disclosed herein is an encryption processing apparatus including: a first register device; a second register device; a first flag operation device; a first operation device; a second operation device; a round operation device; a third and a fourth operation device; a second flag operation device; and a fifth operation device.... Agent: Frommer Lawrence & Haug
20100232600 - Exclusive encryption system: An encryption system includes a plurality of encryption operations including individual encryption operations and group encryption operations available for application in the encryption of data. The plurality of encryption operations are selected from the group consisting of functional variance, functional alignment, mathematical offset, wide XOR function, short logical rotation, long... Agent: Welsh & Flaxman LLC
20100232599 - Fault-resistant calculcations on elliptic curves: Means for checking the correctness of a cryptographic operation on an elliptic curve E(Z/pZ), including fault-resistant computation of Q=kP on elliptic curve E(Z/pZ). Elliptic curve Ê(Z/pr2Z)≡E(Z/pZ)×E(Z/r2Z) is given by Chinese remaindering and where r is an integer. A point P̂=CRT(P (mod p), R (mod r2)) is formed in Ê(Z/pr2Z); P̂... Agent: Robert D. Shedd. Thomson Licensing LLC Patent Operations
20100232598 - Information recording medium, information recording apparatus and method, and computer program: An information recording medium (10, 301) is provided with: a content recording area to record therein a content group (20) including title information (30); and a control information recording area to record therein control information (37, 38) including (i) type information (412) indicating whether or not the content group is... Agent: Young & Thompson
20100232603 - Decryption processor and decryption processing method: A decryption processor for calculating a plaintext through decryption of a ciphertext c includes, a first part that calculates m′p through modular exponentiation modulo a first prime number p wherein an exponent is a shifted value of d (mod (p−1)), and a base is a value of c (mod p);... Agent: Fujitsu Patent Center Fujitsu Management Services Of America, Inc.
20100232604 - Controlling access to content using multiple encryptions: Controlling access to content using multiple encryptions, including: receiving content comprising media data; first encrypting a substantial portion of the content using a primary key; selecting a subset of the substantial portion of the content; and second encrypting the selected subset of the content using a secondary key different from... Agent: Procopio, Cory, Hargreaves & Savitch LLP
20100232605 - Method and apparatus for providing and receiving conditionally-accessed various application information: The present invention provides various types of encrypted application information. An encoding method according to the present invention encrypts application information to be provided through an application service, creates a first service component frame including an ID of the application service and control data used for encryption of the application... Agent: Fish & Richardson P.C.
20100232606 - Method and system for authenticating in a communication system: A method and system for authenticating in a communication system are provided. The method includes, in a first authenticator, sending an authenticator relocation request to a second authenticator transmitting a hash value for an authentication parameter of a Mobile Terminal (MT), a random parameter 1, and a random parameter 2... Agent: JeffersonIPLaw, LLP
20100232607 - Information processing device, content processing system, and computer readable medium having content processing program: An information processing device and method include storing encrypted content, storing a key for decrypting the encrypted content stored, decrypting the encrypted content stored using the key, storing a deletion table storing information indicating whether or not the key stored is to be deleted when a transition from an operating... Agent: Staas & Halsey LLP
20100232608 - Ocdm-based photonic encryption system with provable security: In an OCDM-based photonic encryption system by applying random noise on unused channels and varying the inter-code phases on realistic framing repetition, an OCDM-based encryption system with provable security guarantees results.... Agent: Telcordia Technologies, Inc.09/09/2010 > patent applications in patent subcategories. class, title,number
20100226493 - Encryption/decryption device, encryption/decryption method, and computer program: It is possible to realize a Feistel-type common key block encryption/decryption processing configuration capable of reducing data stored in a memory at a low cost. The Feistel-type common key block encryption/decryption processing repeatedly executes an SP-type F function having nonlinear and linear transform sections by several rounds. At least one... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100226494 - System and method for payload encoding and decoding: Systems, methods and apparatuses are disclosed for protecting encoded media data. A minimum set of information needed to encode a single message for an encoded audio signal is loaded separately from the media data into an encoder. A media license file is generated to protect the encoded data, where the... Agent: Katten Muchin Rosenman LLP / Arbitron Inc. (c/o Patent Administrator)
20100226495 - Digital readout method and apparatus: A digital focal plane array includes an all-digital readout integrated circuit in combination with a detector array. The readout circuit includes unit cell electronics, orthogonal transfer structures, and data handling structures. The unit cell electronics include an analog to digital converter. Orthogonal transfer structures enable the orthogonal transfer of data... Agent: Hamilton, Brook, Smith & Reynolds, P.C.
20100226496 - Encryption apparatus, decryption apparatus, key generation apparatus, and storage medium: A decryption apparatus includes a section assignment unit which assigns a section D to a plurality of encrypted texts Fi(x,y,t) (i=1, . . . , k), a one-variable polynomial arithmetic unit which subtracts L pairs of polynomials he(t) and hw(t) after the assignment, and a greatest common divisor arithmetic unit... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.
20100226497 - Communications system employing orthogonal chaotic spreading codes: Systems and methods for code-division multiplex communications. The methods involve forming orthogonal or statistically orthogonal chaotic spreading sequences (CSC1,1, CSCD,1), each comprising a different chaotic sequence. The methods also involve generating an offset chaotic spreading sequence (CSC1,2, CSC1,3, . . . , CSC1,K(1), CSCD,2, . . . , CSCD,K(D)) which... Agent: Harris Corporation C/o Fox Rothschild, LLP09/02/2010 > patent applications in patent subcategories. class, title,number
20100220853 - Method and apparatus for compound hashing via iteration: A method and apparatus for a system and process for generating a hashing value using any number of cryptographic hashing functions. The hashing process receives an input value to be hashed. The input value is cyptographically hashed and augmented. The augmented value is then cryptographically hashed. The process then iteratively... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20100220854 - Data security system: A data security system that includes a first memory device to store message data to be secured, a second memory device to store microcode including an instruction set defining a cryptographic algorithm for use in securing the message data, and a processing unit to execute the microcode to implement the... Agent: Fish & Richardson P.C.
20100220855 - Strengthened key schedule for arcfour: Some embodiments of a method and an apparatus to strengthen key schedule for arcfour have been presented. In one embodiment, an S array of a predetermined size is initialized. The S array is usable in a key generating process of arcfour encryption. The key generation process is extended to generate... Agent: Red Hat/bstz Blakely Sokoloff Taylor & Zafman LLP
20100220856 - Private pairwise key management for groups: In an example embodiment, a key generation system (KGS) is used to generate private pairwise keys between peers belonging to a group. Each member of the group is provisioned with a set of parameters which allows each member to generate a key with any other member of the group; however,... Agent: Tucker Ellis & West LLP
20100220857 - System and method for registering secret key: A secret key registration system which registers a secret key in a portable key device and vehicle. A first transformation equation is stored in a writer and the vehicle. A second transformation equation is stored in the portable key device and the vehicle. The writer transmits a registration code to... Agent: Patterson Thuente Christensen Pedersen, P.A.
20100220858 - Correlation-based system for watermarking continuous digital media: A correlation-based system for watermarking continuous digital media at the system application level. It is a post-compression process for watermarking where no a priori knowledge of the underlying compression algorithm is required. Per each compressed media frame, a current unique digital signature is generated based on the data from the... Agent: Lawrence N. Ginsberg
20100220859 - Communication system, and an encoding device and a decoding device thereof: A communication system includes encoding and decoding devices. The encoding device includes an encrypting module adapted for encrypting an original signal into an encrypted signal, and an error correction encoding module coupled to the encrypting module for receiving the encrypted signal therefrom, and generating an output signal by performing error... Agent: Osha Liang L.L.P.
20100220860 - Method of and apparatus for transmitting data: A method of transmitting data by which cipher-transmission of digital information data for which forbidden codes including timing identification codes are predetermined can be carried out with enciphered digital information data without containing undesirable forbidden code, in which digital information data contained in word sequence data which contain also time... Agent: Frommer Lawrence & Haug
20100220861 - Multiple transform utilization and application for secure digital watermarking: Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital... Agent: Scott A. Moskowitz
20100220862 - Method, apparatus and computer program product for providing security during handover between a packet-switched network and a circuit-switched network: A method, apparatus and computer program product are provided to facilitate security in response to a handover from an initial network to a subsequent network, such as a handover between a packet-switched network and a circuit-switched network. The method, apparatus and computer program product may provide at least one security... Agent: Alston & Bird LLP
20100220863 - Key recovery mechanism for cryptographic systems: A cryptographic system can include a register containing a key and a processor coupled to the register. The processor can be operable for performing a first encrypting operation, where the encrypting operation includes computing a key schedule using the register as a workspace. At the end of the first encrypting... Agent: Fish & Richardson P.C.Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.33308 seconds