|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
11/2010 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography November recently filed with US Patent Office 11/10Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 11/25/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100296649 - Cryptographic processing of content: A system for cryptographic processing of content comprises an input for receiving the content. A plurality of look-up tables represents a white-box implementation of a combined cryptographic and watermarking operation. The look-up tables represent processing steps of the combined cryptographic and watermarking operation and the look-up tables being arranged for... Agent: Schwegman, Lundberg & Woessner, P.A.
20100296650 - Wireless communication system, base station, terminal and wireless communication method: A base station of a wireless communication system includes: a base station side data generation portion generating a number of sets of scramble data which are different from each other while the number of sets of the scramble data is the same as or more than the number obtained by... Agent: Morrison & Foerster LLP
20100296651 - Encryption apparatus and method therefor: An encryption apparatus (14) includes an integrated circuit (34) having a secure processing section (30). A plaintext reset epoch key (154) is stored in the secure processing section (30) and configured to have a short life. A plaintext master key (160) is stored in the secure processing section (30) and... Agent: Meschkow & Gresham, P.L.C
20100296652 - Information recording medium, information processing apparatus, information processing method, and computer program: There are provided an information recording medium, an information processing apparatus, an information processing method, and a computer program, which can realize users' convenience for using content in accordance with a license and copyright protection. An information recording medium stores an encrypted content file including encrypted content, usage right information... Agent: Finnegan, Henderson, Farabow, Garrett & Dunner LLP
20100296653 - System of dependant keys across multiple pieces of related scrambled information: A method for processing data including the steps of providing a scrambling key for a current data to be scrambled, the current data being a piece of information that is from a plurality of pieces of information; providing an identification token of another piece of information from the plurality of... Agent: Uniloc Usa Inc.
20100296654 - Configuring a network connection: A communication system for accessing media items via a display device. A receiver is coupled to the display device and a transmitter is coupled to a computer system. Media items stored locally on the computer system and/or remotely on a remote server may be wirelessly transferred from the transmitter to... Agent: Patterson & Sheridan, LLP/cisc
20100296655 - Key distribution system: A key distribution system for controlling access to content by rendering devices, comprising an epoch module to provide epochs, each epoch including service key periods, a service key module to provide a batch of service keys, a group module to provide group keys for each epoch such that each rendering... Agent: Husch Blackwell Sanders, LLP Husch Blackwell Sanders LLP Welsh & Katz11/18/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100290617 - Secure outsourced aggregation with one-way chains: Secure outsourced aggregation of data using one-way chains is discussed in this application. Each input data source such as a sensor generates a Verifiable Synopsis (“VS”) which includes sensor data, an Inflation Free Proof (“IFP”) generated using a cryptographic function and a Self-Authenticating Value (“SEAL”) chain generated using a one-way... Agent: Lee & Hayes, PLLC
20100290618 - method and apparatus for authenticating a user: A method of generating a private key for use in an authentication protocol comprises, at a client: receiving a user specific identifier; converting the identifier through a one-way function to a string of a pre-determined length; and mapping said string to a permutation πpriv of a pre-determined order, said permutation... Agent: Sullivan & Worcester LLP
20100290619 - Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method: The invention provides an enciphering apparatus and method, a deciphering apparatus and method and an information processing apparatus and method by which illegal copying can be prevented with certainty. Data enciphered by a 1394 interface of a DVD player is transmitted to a personal computer and a magneto-optical disk apparatus... Agent: Frommer Lawrence & Haug
20100290620 - Method and apparatus for modifying a subsequently generated control command in a content control system: In record or content control management systems, various selected reference, record control, copy protection or control information signals, or other signifiers, are used to identify control signals, for example, bits, to provide control of subsequent use of data, audio and video signals in the analog and digital domain. Method and... Agent: Patent Department Rovi Corporation
20100290621 - Tunneling support for mobile ip using a key for flow identification: In a network that supports mobility of a mobile node, a tunnel between a first mobility node and a second mobility node is established in the network. The established tunnel is according to a tunneling protocol (e.g., Generic Routing Encapsulation tunneling protocol) that uses at least one key (208) for... Agent: Trop, Pruner & Hu, P.C.
20100290622 - Wireless communication system and method for automatic node and key revocation: A wireless system and method to control the cryptographic keying material that has been compromised in the network; exclude captured nodes from the network; and update compromised keying material in uncompromised devices are described. This system and method is useful in alpha-secure key distribution systems comprising a multitude of alpha-secure... Agent: Philips Intellectual Property & Standards
20100290624 - Key management system and method: Methods and systems are disclosed for providing secured data transmission and for managing cryptographic keys. One embodiment of the invention provides secure key management when separate devices are used for generating and utilizing the keys. One embodiment of the invention provides secure storage of keys stored in an unsecured database.... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100290623 - Protection of encryption keys in a database: System, method, computer program product embodiments and combinations and sub-combinations thereof for protection of encryption keys in a database are described herein. An embodiment includes a master key and a dual master key, both of which are used to encrypt encryption keys in a database. To access encrypted data, the... Agent: Sterne, Kessler, Goldstein & Fox P.l.l.c.
20100290626 - Optical transmitters and receivers for quantum key distribution: An optical receiver for a quantum key distribution system comprises a plurality of optical components mounted or formed in a substrate and optically coupled by one or more hollow core waveguides formed in the substrate.... Agent: Oliff & Berridge, PLC
20100290625 - Secure group communications: A device for use in a system with multiple receiving units, and multiple intermediate units each configured to communicate with the device and at least some of the multiple receiving units, includes a communication module configured to send information toward and receive information from the receiving units and the intermediate... Agent: Mintz Levin Cohn Ferris Glovsky & Popeo
20100290627 - Key management server, terminal, key sharing system, key delivery program, key reception program, key delivery method, and key reception method: In distribution and sharing of a cipher key to be used when performing encrypted communication among a plurality of terminals, to share a cipher key without the need for each terminal to constantly hold and manage a large number of keys. Also, to shorten the time needed to start terminal-to-terminal... Agent: Oblon, Spivak, Mcclelland Maier & Neustadt, L.L.P.11/11/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100284530 - Method for decoding a probabilistic anti-collusion code: The invention relates to a method for decoding a probabilistic anti-collusion code intended to identify at least one sequence of code present in a multimedia content having been used to create an illegal copy of this multimedia content, this method comprising a step of estimating the collusion strategy used to... Agent: Robert D. Shedd Thomson Licensing LLC
20100284531 - Method and apparatus for article authentication: An authentication method for authenticating an article in a device includes the steps of (a) reading an identification number stored on the article, (b) reading an authentication number stored on the article, (c) determining an input number based at least in part on the identification number, (d) applying an authentication... Agent: Alston & Bird LLP
20100284533 - Method and device for generating pseudorandom number, and method and device for encryption using pseudorandom number: Provided are a method and apparatus for generating a pseudo-random number which is unpredictable and which has a small memory work area, and also a method and apparatus for encrypting data, for each predetermined amount, based on the generated pseudo-random number. A seed is divided into a predetermined number of... Agent: Studebaker & Brackett PC
20100284532 - Systems for embedding information in data strings: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a... Agent: Treyz Law Group
20100284534 - Packet cipher algorithm based encryption processing device: A packet cipher algorithm based encryption processing device includes a key expand unit and an encryption unit. The key expand unit comprises a key expand unit data registration component and at least one key expand unit data conversion component. The encryption unit comprises an encryption unit data registration component and... Agent: Harness, Dickey & Pierce, P.L.C
20100284535 - Communications system: A mobile communications system is proposed in which a two stage procedure is used for setting up Radio Bearers within a mobile communications device and UTRAN. In the first stage, both the mobile device and UTRAN perform ciphering based on an old Start value. In the second stage, the mobile... Agent: Mcginn Intellectual Property Law Group, PLLC
20100284536 - System and method for obtaining certificate status of subkeys: Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of... Agent: Jones Day (rim) - 2n
20100284538 - Control of an entity to be controlled by a control entity: A control entity communicates with an entity to be controlled so as to effect a control, a secret key being associated with the control entity. These entities share public parameters, a second public parameter being a combination of a first public parameter of the said plurality with the secret key.... Agent: Miller, Matthias & Hull
20100284537 - Method for efficiently decoding a number of data channels: The present invention relates to a method for efficiently decoding a plurality of ciphertexts comprising the steps of: (a) receiving at least one cipher key associated with said ciphertexts; (b) expanding said at least one cipher key for producing its corresponding subkeys; (c) storing said subkeys in a memory; (d)... Agent: Kevin D. Mccarthy Roach Brown Mccarthy & Gruber, P.C.
20100284539 - Methods for protecting against piracy of integrated circuits: Techniques are provided for reducing the likelihood of piracy of integrated circuit design using combinational circuit locking system and activation protocol based on public-key cryptography. Every integrated circuit is to be activated with an external key, which can only be generated by an authenticator, such as the circuit designer. During... Agent: Marshall, Gerstein & Borun LLP
20100284540 - Resilient cryptographic scheme: A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key; encrypting a first of the key parts using a first cryptographic algorithm to generate a... Agent: Rim11/04/2010 > patent applications in patent subcategories. recently filed with US Patent Office
20100278332 - Data conversion function processor: In a MISTY1 FI function, an exclusive OR to which a round key KIij2 is inputted is arranged between an exclusive OR arranged on a 9-bit critical path in a first MISTY structure and a zero-extend conversion connected to the branching point of a 7-bit right system data path. Then,... Agent: Staas & Halsey LLP
20100278334 - Method and apparatus for minimizing differential power attacks on processors: A method of masking a cryptographic operation using a secret value, comprising the steps of dividing the secret value into a plurality of parts; combining with each part a random value to derive a new part such that the new parts when combined are equivalent to the original secret value;... Agent: Blake, Cassels & Graydon LLP
20100278333 - Method and apparatus for performing elliptic curve arithmetic: A method of performing a cryptographic operation on a point in an elliptic curve cryptosystem using an elliptic curve. The method comprises the steps of obtaining information that uniquely identifies the elliptic curve and performing computations on the point to obtain the result of the cryptographic operation. The computations use... Agent: Blake, Cassels & Graydon LLP
20100278331 - Secure hashing device using multiple different sha variants and related methods: A monolithic integrated circuit (IC) secure hashing device may include a memory, and a processor integrated with the memory. The processor may be configured to receive a message, and to process the message using a given secure hash algorithm (SHA) variant from among different SHA variants. The different SHA variants... Agent: Allen, Dyer, Doppelt, Milbrath & Gilchrist
20100278335 - Arrangements for location-based security systems and methods therefor: Aspects are applicable to secure encryption such as in the generation of a cryptographic key from location information as may be useful in portable/wireless communication devices. As an example, one embodiment is implemented as a method of generating cryptographic keys from location information derived from a signal received from a... Agent: Crawford Maunu PLLC
20100278336 - Method and apparatus for establishing a secure multicast communication session: A system for establishing an encrypted multicast communication session over a communications network can include a client means (e.g., a radio, laptop, workstation, phone, PDA) and a server means. The client means can transmit a request for a first user to join a pre-defined collaborative group, including at least the... Agent: Proskauer Rose LLP
20100278338 - Coding device and method with reconfigurable and scalable encryption/decryption modules: A reconfigurable and scalable cryptography (encryption/decryption) system architecture and related method are described. The system utilizes a multiple-pass approach, each pass applying one cryptography algorithm with its own cryptography keys. The encrypted data can only be fully and correctly decrypted with the correct algorithms in the correct sequence (as determined... Agent: Chen Yoshimura LLP Attention Ying Chen
20100278337 - Encryption-based location masking: The subject matter disclosed herein provides methods and apparatus, including computer program products, for masking locations, such as uniform resource locators. In one aspect, there is provided a computer-implemented method. The method may include receiving one or more blocks; inserting one or more characters into at least one of the... Agent: Mintz, Levin, Cohn, Ferris, Glovsky And Popeo, P.c
20100278339 - Encryption- and decryption-enabled interfaces: Decryption apparatus includes an input memory (48), which is coupled to receive encrypted data, and an output transducer (28), for presenting decrypted data to a user. A decryption processor (50) is coupled to read and decrypt the encrypted data from the input memory but is incapable of writing to the... Agent: D. Kligler I.p. Services Ltd
20100278340 - Encryption device, encryption method and storage medium storing its program: When processing a data conversion function of a MISTY structure, such as the FO function of MISTY1, the logical calculation result t3 of the exclusive OR 614 of the process result of the FI function 602 of the MISTY structure in the second stage and a logical calculation result t1... Agent: Staas & Halsey LLP
20100278341 - Radio communication system, radio communication apparatus, and ciphering method: The radio communication system of the present invention includes a radio access network (10) and a radio communication apparatus (60). The radio communication apparatus (60) includes a control unit (61) that, when reconfiguring a radio access bearer between a DCH and an uplink line E-DCH and downlink line HSDPA, sets... Agent: Mcginn Intellectual Property Law Group, PLLC
20100278342 - Device, system, and method of establishing secure wireless communication: Device, system, and method of establishing secure wireless communication. A system includes at least one wireless communication device having a sensor to measure one or more parameters of a physical event shared between that device and another wireless communication device, and a processor to translate the one or more measured... Agent: Kacvinsky Daisak PLLC
20100278343 - Wireless communication apparatus and processing method thereby: When a wireless network is constructed, a wireless communication apparatus in the wireless network constructed of a plurality of communication apparatuses decides whether to function as a providing source of communication parameters or as a provision destination that receives communication parameters. In a case where it has been decided that... Agent: Fitzpatrick Cella Harper & Scinto
20100278344 - System, portable object and terminal for decrypting encrypted audio and/or video data: The invention relates to a system (10) for decrypting encrypted audio and/or video data. The system includes a terminal (13) and at least one portable object (14). The terminal and/or the portable object include means for receiving ciphered audio and/or video data from outside the system, means for determining at... Agent: Buchanan, Ingersoll & Rooney PC
20100278345 - Method and apparatus for proximity based pairing of mobile devices: A method and an apparatus that establish a first communication channel or pair with a target device in proximity to a source device are described. A pairing message is sent to the target device in proximity to the source device over the first communication channel from the source device. A... Agent: Apple Inc./bstz Blakely Sokoloff Taylor & Zafman LLPPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130509:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.41919 seconds