|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
05/2011 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography May archived by USPTO category 05/11Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 05/26/2011 > 10 patent applications in 8 patent subcategories. archived by USPTO category
20110123020 - Endecryptor capable of performing parallel processing and encryption/decryption method thereof: An encryption/decryption method of an endecryptor including a plurality of endecryption units supporting an XES mode with tweak and ciphertext streaming (XTS) includes dividing an input data stream into consecutive data units; inputting the divided data units to the endecryption units, respectively; and simultaneously processing the input data units at... Agent: Samsung Electronics Co., Ltd.
20110123021 - Surrogate key generation using cryptographic hashing: The present invention relates to a method or system of generating a surrogate key using cryptographic hashing. One embodiment of the method of the present invention may have steps such as selecting a field or group of fields that is or are unique among all records in the database, for... Agent: International Business Machines Corporation
20110123022 - Random number generating device, random number generating method, and security chip: A random number generating device includes: a random number generator configured to have a plurality of random number generating elements that generate a random number in response to supply of a spin-injection current; and a temperature controller.... Agent: Sony Corporation
20110123023 - Apparatus for video encryption by randomized block shuffling and method thereof: An apparatus for video encryption by randomized block shuffling according to an embodiment of the present invention includes: a random number and key manager that stores a key shared between a video encryption apparatus and a video decryption apparatus and generates a random number by using the key; and a... Agent: Electronics And Telecommunications Research Institute
20110123024 - Rollback attack prevention system and method: A rollback attack prevention system 10 for a gaming machine 20 includes a configuration log 30 and a revocation list 40. Preferably, the configuration log 30 includes a protected record of software that has been installed on the gaming machine 20. Further, the revocation list 40 includes an inventory of... Agent: Bally Gaming, Inc.
20110123025 - Electronic rental service system and method for digital content: A system for making digital content data available to an end user station (26.1) comprises a source (12) for generating source encrypted data comprising the content data encrypted with a key (15) of a content encryption key (CEK) pair and share data relating to the CEK. The share data being... Agent:
20110123026 - Duplication means for an electronically coded key and related method: Method for the duplication of original electronic keys used in the automotive transports, and provided with coded and encrypted electronic authentication means, comprising: an Identification Code (ID), an encrypted secret code, a Password, an algorithm, data storage and computing means, able of being used in vehicles provided with a central... Agent:
20110123028 - Systems and/or methods of increased privacy wireless communications: Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content of the wireless communications, biometric data and/or a position from which the wireless communications takes place. A plurality of communications modes is used by the system infrastructure... Agent: Eices Research, Inc.
20110123027 - Use of a mobile telecommunication device as an electronic health insurance card: The invention relates to a method for decoding a medicinal data object (132) by means of a data processing system (100). The medicinal data object is encoded by means of a data object key, a signature is allocated to said data object key and the data object key is encoded... Agent: Compugroup Holding Ag
20110123029 - Method and system for generating an identity identifier of a key: A method for generating an identifier of a key, comprises that: when a user equipment (UE) transfers from an evolved UMTS terrestrial radio access network (EUTRAN) to a universal terrestrial radio access network (UTRAN) or a global system for mobile communications (GSM), or an enhanced data rate for GSM evolved... Agent: Zte Corporation05/19/2011 > 15 patent applications in 8 patent subcategories. archived by USPTO category
20110116625 - Cryptographic system: A cryptographic system comprises a white-box implementation of a function; an implementation of a cryptographic algorithm; and an implementation of a combining operation for establishing cryptographically processed data in dependence on an outcome of the function and in dependence on an outcome of the cryptographic algorithm. The combining operation comprises... Agent: Irdeto B.v.
20110116623 - Generating genus 2 curves from invariants: One or more techniques and/or systems are disclosed for generating a genus 2 curve for use in cryptography. One or more invariant values used to generate the genus 2 curve are determined by evaluating one or more invariant functions on a Hilbert modular surface. The genus 2 curve is generated... Agent:
20110116626 - Method for processing data in various encoded domains: A method for processing data in various encoded domains, wherein the encoded domains exchange data by emulating the encodings or decodings, respectively, of other domains.... Agent: Sia Whitecryption
20110116624 - System and method for data obfuscation based on discrete logarithm properties: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for obfuscating data based on a discrete logarithm. A system practicing the method identifies a clear value in source code, replaces the clear value in the source code with a transformed value based on the clear value and a discrete... Agent: Apple Inc.
20110116628 - Cryptographic key split binder for use with tagged data elements: A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from among a plurality of tagged data elements, based on an associated data tag. A plurality of cryptographic key splits is generated from seed data. The cryptographic key... Agent: Tecsec, Inc.
20110116627 - Fast key-changing hardware apparatus for aes block cipher: A fast key-changing hardware apparatus, which generates one sub-key each clock cycle, which is used by advanced encryption system (AES) algorithm block cipher, is independent from the AES algorithm block cipher. The invented apparatus automatically generate expanded keys from the input cipher key, store them in the key expanded RAM... Agent:
20110116629 - Methods, apparatuses and computer program products for providing multi-hop cryptographic separation for handovers: A method, apparatus and computer program product are provided to provide cryptographical key separation for handovers. A method is provided which includes calculating a key based at least in part upon a previously stored first intermediary value. The method also includes calculating a second intermediary value based at least in... Agent: Nokia Corporation
20110116630 - Traceable method and system for broadcasting digital data: m
20110116633 - Apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment: The details of an apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment are disclosed herein. The ciphering activation time is determined for radio bearers other than RB2 by measuring the data rate on each target radio bearer during the time that it... Agent: M-stack Limited
20110116631 - Method and apparatus for forming security channel in short range communication: A channel connection of a device that performs short range wireless communication is provided. If a public key that is broadcast by a specified device is received, the device encrypts its own UID (Unique Identifier) using the public key to transmit the encrypted UID to the specified device, transmits a... Agent: Samsung Electronics Co., Ltd.
20110116632 - Methods and systems for obscuring network topologies: Node, computer software and method for preventing an external party (114) to map an identity of a network cell (122) of a telecommunication network (112 or 120) with a corresponding geographical location of the network cell (122). The method includes receiving at a base station (200) of the telecommunication network... Agent: Telefonaktie Bolaget L M Ericsson (publ)
20110116634 - Method and system for installing sound sets on electronic instruments: A method and system of installing a sound set on an electronic instrument is disclosed. The method and system includes an electronic instrument having a serial number, a sound set having a plurality of sampled sounds, and an encrypted key having a matching serial number and a signature of the... Agent: Ion Audio, LLC.
20110116635 - Methods circuits devices and systems for provisioning of cryptographic data to one or more electronic devices: Disclosed are methods, circuit, devices and systems for provisioning cryptographic material to a target device. According to embodiments, a cryptographic material provisioning (CMP) module may be adapted to process a provisioning message with a first message portion which is encrypted with a native key of the target device and which... Agent:
20110116636 - Intelligent file encapsulation: An improved network-based system and network implemented method of distributing and controlling the release of an encapsulated content. The system comprising an archive creation tool configured to create a self-extractable archive comprising an encrypted content, distribution means adapted to distribute the archive to one or more users and a server... Agent:
20110116637 - Methods, systems, and computer program products for automatically verifying and populating digital certificates in an encryption keystore: Methods for automatically verifying and populating an encryption keystore are provided. Pursuant to these methods, the keystore may be automatically checked to determine if it is missing a required digital certificate; if so, the missing required digital certificate may be automatically inserted into the keystore. The methods may also include... Agent:05/12/2011 > 11 patent applications in 6 patent subcategories. archived by USPTO category
20110110515 - Methods and apparatus for audience data collection and analysis in a content delivery network: Methods and apparatus for collection and processing of data relating to users of a content-delivery network. In one embodiment, the content delivery network is a cable or satellite or HFCu network, and the apparatus includes an architecture for routinely harvesting, parsing, processing, and storing data relating to the activities of... Agent:
20110110517 - Content playback device: To provide a content playback device capable of protecting content according to DRM, when decrypting encrypted content recorded on a recording medium and playing the decrypted content. If key generation information is “00”, a key control unit 104 concatenates a decrypted media key and content information in this order, and... Agent:
20110110516 - Content receiver, content reproducer, management server, content use system, content use method, method of write-out from content receiver, method of possible viewing time management on content reproducer, method of time limit fixation in management serve: In a service enabling viewing of a rental content time-limit-managed by a copyright protection system (DRM) for a certain time period from first-time viewing in a video download service through a network, even possible viewing times for the content under the one and another copyright protection systems when the content... Agent:
20110110519 - Data transmission device, data reception device, methods thereof, recording medium, and data communication system therefor: A data transmission device (100) performs encryption processing on transmission data, performs encryption processing of a Feistel structure on the obtained first converted data, and performs processing in the relationship of an inverse function with the first encryption processing on the obtained second converted data. A first converting unit (105)... Agent:
20110110518 - Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué: A computationally implemented method includes, but is not limited to: receiving communiqué reception information that indicates reception of a communiqué that is affiliated with a source entity and that is directed to an end user; and presenting, in response to receiving the communiqué reception information and in lieu of presenting... Agent: Searete LLC
20110110521 - Electronic device and network accessing method thereof: Disclosed are an electronic device enabling wireless networking through a wireless network and a network accessing method thereof, the electronic device including: a communicating unit which accesses the wireless network to perform wireless networking; an encoding unit which encodes a signal transmitted from or received by the communicating unit; and... Agent: Samsung Electronics Co., Ltd.
20110110522 - Pairing method and apparatus for ad-hoc connection in wireless communication terminal: A pairing method and an apparatus thereof for an ad-hoc connection in a wireless communication terminal are provided. In the method, an event duration that occurs according to user manipulation is measured. A pairing key is generated using the measured duration. A pairing procedure is performed with a counterpart terminal... Agent: Samsung Electronics Co., Ltd.
20110110520 - Virtual neighbor objects for managing idle mode mobility in a wireless network: Systems, methods, and apparatus that facilitate optimal idle mode reselection are presented herein. A virtual neighbor component can be configured to create at least one virtual neighbor object and associate the at least one virtual neighbor object with at least two wireless access points. A reselection component can be configured... Agent: At&t Mobility Ii LLC
20110110523 - Wireless perimeter security device and network using same: A Radio Frequency based security system for providing security for wireless Local Area Networks (WLAN) that allows the creation and maintenance of arbitrarily shaped secure wireless access areas with boundaries around said wireless Local Area Network and prevents access to the said wireless LAN from outside the perimeter of the... Agent:
20110110524 - System for on-line and off-line decryption: A secure communication system wherein message decryption may be performed while off-line, or optionally while on-line. A sender encrypts a message based on the message key and sends it to the recipient. An envelope containing a message key is created by encrypting the message key based on a verifier, where... Agent: Proofpoint, Inc.
20110110525 - Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus: A method includes encrypting information in accordance with an encryption scheme that uses a public key; encrypting a plurality of instances of a secret key, each being encrypted using at least one additional instance of the public key; sending the encrypted information and the plurality of encrypted instances of the... Agent: International Business Machines Corporation05/05/2011 > 12 patent applications in 7 patent subcategories. archived by USPTO category
20110103580 - Compressing encrypted data without the encryption key: A method, system and computer program product are disclosed for compressing encrypted data, wherein the data is encrypted by using a block encryption algorithm in a chained mode of operation, and the encrypted data is comprised of a set of N encrypted blocks, C1 . . . CN. In one... Agent: International Business Machines Corporation
20110103579 - Format preserving encryption systems for data strings with constraints: Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted to ciphertext by repeated application of a format preserving encryption cryptographic algorithm. Following each application of the format preserving cryptographic algorithm, the resulting version of the string may be... Agent:
20110103578 - Systems and methods for efficiently creating digests of digital data: Systems and methods efficiently process digests, hashes or other results by performing multiplicative functions in parallel with each other. In various embodiments, successive processing stages are provided, with each stage performing parallel multiplicative functions and also combining input terms to reduce the total number of terms that remain to be... Agent: General Dynamics C4 Systems, Inc.
20110103581 - Method and apparatus for generating non-interactive key and method for communication security using the same: A method and apparatus for generating a non-interactive key, and a method for communication security using the same. A event is detected, and keys are generated based on the detected event. Thus, keys are generated using a small number of calculating operations with a simple interface and thus a user... Agent: Samsung Sds Co., Ltd.
20110103582 - System for securing access to data streams: A method and an apparatus for protecting digital content, in which an output format for received compressed encrypted digital content is determined based, at least in part, on a rule determining whether clear compressed output format is allowed. When the clear compressed output format is not allowed, the content is... Agent: Nds Limited
20110103583 - Method and system for preserving security of sensor data and recording medium using thereof: A method and a system for preserving sensor data based on a time key, and a recording medium thereof are provided. The time key based sensor data security preserving method includes encrypting the sensor data with an encryption key obtained using a time key based polynomial derived using random numbers... Agent: Korea Internet & Security Agency
20110103584 - Protection of a ciphering key: A method for protecting a key used, by an electronic circuit, in a symmetrical algorithm for ciphering or deciphering a message, including the steps of complementing to one the key and the message; executing the algorithm twice, respectively with the key and the message and with the key and the... Agent: Stmicroelectronics (rousset) Sas
20110103585 - Mobile content magnet: Methods and apparatus for a Mobile Content Magnet are disclosed. One embodiment of the present invention is a miniature electronic device, which functions as a fully-powered personal computer, which stores digital files and content, and which communicates wirelessly with external input and output devices and a network such as the... Agent:
20110103586 - System, method and device to authenticate relationships by electronic means: The present invention is in the Information Technology field, specifically in the authentication of systems' users by using wireless remote communication technologies and refers to a system, a method, and a device capable of authenticating users and providers of centralized services, safely and reciprocally. More specifically, the invention's field of... Agent:
20110103587 - Data concealing apparatus, data decryption apparatus and image forming apparatus having data encrypting function: Disclosed is a data concealing apparatus, which makes it possible to heighten the strength of the encryption processing that employs such the data cryptography method in which the encryption of compressed image data is achieved by destroying a part of the compressed image data concerned. The data concealing apparatus includes:... Agent: Konica Minolta Business Technologies, Inc.
20110103588 - Key agreement and re-keying over a bidirectional communication path: A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second... Agent: Research In Motion Limited
20110103589 - Key distributing method, public key of key distribution centre online updating method and device: A key distributing method, a public key of key distribution centre online updating method, a key distribution centre, a communication entity and a key management system. The system includes: communication entities, a carrying device, a key distribution centre and a database, wherein the carrying device carries or transports the information... Agent: China Iwncomm Co., Ltd.Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.62975 seconds