|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
07/2011 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography July category listing 07/11Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 07/28/2011 > 12 patent applications in 8 patent subcategories. category listing
20110182420 - Access management for connection-accompanying data of telecommunication connections: The invention is characterized in that a storage of the data takes place according to to specifications of the respective telecommunications subscriber and/or the respective network operator involved and the recorded data of the telecommunications connection are stored directly in the network of the used telecommunications network and, in this... Agent: Deutsche Telekom
20110182421 - Encipherment of digital sequences by reversible transposition methods: Methods for transposing elements of a sequence according to a rule, wherein the rule is derived from pseudo-noise or pseudo-noise like binary and non-binary sequences are disclosed. Sequences of transposed symbols can be recovered by applying a reversing rule. Sets of orthogonal hopping and transposition rules are created by applying... Agent: Ternarylogic LLC
20110182419 - Encryption algorithm with randomized buffer: A system obtains a key and first and second plaintext, where the first plaintext is identical to the second plaintext. The system uses the key to encrypt the first plaintext to a first ciphertext and the second plaintext to a second ciphertext using a same encryption algorithm, where the first... Agent: Verizon Data Services Inc.
20110182423 - Data encryption and decryption with a key by an n-state inverter modified switching function: Methods and apparatus for implementing an n-state ripple-adder scheme coder with n≧2 using an n-state reversible switching function and a non-reversible n-state switching function acting upon a first and a second word of at least 2 n-state symbols are disclosed. Corresponding decoding methods and apparatus are also disclosed. A resulting... Agent:
20110182422 - Document authentication data embedding method and apparatus: A method of embedding authentication data in an electronic document image is described. Data related to an item of information on an image of at least one page in the electronic document is acquired. The image is decomposed into a hierarchy of images having a top level and one Or... Agent: Adsensa Ltd.
20110182424 - Sequencing encoded data slices: A method begins by a processing module receiving data segments of a data stream to produce received data segments. The method continues with the processing module encrypting a data segment of the received data segments to produce an encrypted data segment and dispersed storage error encoding the encrypted data segment... Agent: Cleversafe, Inc.
20110182425 - Secure connected digital media platform: An embodiment of the invention provides a system including a secure media device having one or more security keys stored therein. The secure media device is housed in a device that is connected to a television unit and a network. Secure application environments are housed in the device, wherein each... Agent: International Business Machines Corporation
20110182426 - Dynamic group creation for managed key servers: A technique for dynamically creating and deleting groups to support secure group communication sessions is provided herein. A request for creation of a dynamic group that enables group members to participate in a secure group communication session is received by a network authentication device such as a key server. Creation... Agent: Cisco Technology, Inc.
20110182427 - Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least in part, of encrypted communication carried out, at least in part, between the nodes: An embodiment may include circuitry to establish, at least in part, a secure communication channel between, at least in part, a client in a first domain and a server in a second domain. The channel may include a first and second domain sessions in the first and second domains. The... Agent:
20110182428 - Secure communication over passive optical network (pon) with quantum encryption: Systems and methods to communicate securely includes communicating quantum encryption data on a first wavelength-division multiplexing passive optical network (WDM-PON); and communicating data over separate classical channels of a second WDM-PON, wherein the second WDM-PON synchronizes with the first WDM-PON while providing data communication over the classical channels.... Agent: Nec Laboratories America, Inc.
20110182429 - Obfuscation of sequenced encoded data slices: A method begins by a processing module receiving data to produce received data segments. The method continues with the processing module, in order of receiving the data segments, encrypting a data segment to produce an encrypted data segment, dispersed storage error encoding the encrypted data segment to produce a set... Agent: Cleversafe, Inc.
20110182430 - Name encryption device, pseudonymization device, name encryption method, and pseudonymization method: Provided is a name encryption device which suppresses leak and facilities the zero-knowledge proof by making the pseudonymization process to be a simple algebraic calculation. The name encryption device converts an encrypted name text into a pseudonym-encrypted text by dispersing the encrypted name text. The encryption device disperses a name... Agent: Nec Corporation07/21/2011 > 11 patent applications in 9 patent subcategories. category listing
20110176673 - Encrypting apparatus: An encrypting apparatus includes a digest part using a SHA-2 algorithm of which a basic unit of operation is 32*Y (Y=1 or 2) bits. The digest part includes a shift register including a series of registers, and a predetermined number of adders performing an addition operation based on data stored... Agent: Fujitsu Semiconductor Limited
20110176672 - Method for determining functions applied to signals: Embodiments of the invention discloses a system and a method for determining a result of applying a function to signals including a first signal and a second signal, wherein the function is a polynomial function of the signals such that a monomial in the function includes the first signal having... Agent:
20110176674 - Countermeasure method and device for protecting data circulating in an electronic component: The present disclosure relates to a countermeasure method in an integrated circuit comprising at least one first logic circuit and at least one first input register supplying the first logic circuit with a datum, the method comprising steps of introducing a random datum into each first input register of the... Agent: Stmicroelectronics (rousset) Sas
20110176675 - Method and system for protecting keys: A method of protecting a media key including obtaining the media key, obtaining an auxiliary key, calculating a split key using the media key and the auxiliary key, encrypting the split key using a wrap key to generate an encrypted split key, assembling the encrypted split key and a communication... Agent: Sun Microsystems, Inc.
20110176676 - Method, apparatus and computer program product for efficient elliptic curve cryptography: A method, apparatus and computer program product are provided to more efficiently perform aspects of elliptic curve cryptography such as by more efficiently multiplying an integer k by a point P on an elliptic curve by decomposing the integer into integers k1 and k2. In this regard, respective bounds for... Agent: Nokia Corporation
20110176677 - Multi-party variance multiplication device, multi-party variance multiplication system and method: A multi-party variance multiplication device includes: an initial setting device which generates a first public key by using an inputted system parameter; a commitment generation device which generates a commitment of a first input value based on the system parameter and a random number; an encryption device which generates an... Agent:
20110176678 - Masking operation method and device for symmetric key encrypted system: A masking operation method for a symmetric key encryption system includes, when at least two Substitution-boxes (S-boxes) are input, generating a masking S-box table for one S-box which was input; and performing an operation on one masking S-box by referring to the generated masking S-box table. Further, the masking operation... Agent: Electronics And Telecommunications Research Institute
20110176679 - Suppressing power supply noise using data scrambling in double data rate memory systems: Embodiments of the invention are generally directed to systems, methods, and apparatuses for suppressing power supply noise using data scrambling in double data rate memory systems. In some embodiments, an integrated circuit includes a transmit data path to transmit data to one or more memory devices. The transmit data path... Agent:
20110176680 - Method of handling security in srvcc handover and related communication device: A method for handling security in an SRVCC handover for a mobile device in a wireless communication device is disclosed. The method includes having an active Circuit-Switched (CS) service or a Radio Resource Control (RRC) connection in a CS domain when the mobile device is served by a first network,... Agent:
20110176681 - Communication apparatus and communication method: A communication apparatus includes an encryption key generation unit that generates encryption key information at constant encryption key generation intervals, a common key generation unit that generates common key information uniquely with respect to a generation time at common key generation intervals set longer than the encryption key generation intervals,... Agent: Fujitsu Limited
20110176682 - Integrity protected smart card transaction: Systems, methods, and technologies for configuring a conventional smart card and a client machine, and for performing a smart card authorization using the configured smart card and client. Further, the combination of methods provides for mutual authentication—authentication of the client to the user, and authentication of the user to the... Agent: Microsoft Corporation07/14/2011 > 14 patent applications in 11 patent subcategories. category listing
20110170685 - Countermeasure method and devices for asymmetric encryption with signature scheme: A countermeasure method in an electronic component implementing an asymmetric private key encryption algorithm includes generating a first output data, using a primitive, and a protection parameter, transforming, using the protection parameter, at least one element of a set consisting of the private key and an intermediate parameter obtained from... Agent: Inside Contactless
20110170684 - Determination of pairings on a curve using aggregated inversions: One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the mathematical pairings for the curve are aggregated (e.g., into a single inversion in respective levels of a binary tree representation of... Agent: Microsoft Corporation
20110170686 - Communication apparatus, control method of communication apparatus, computer program, and storage medium: The security level is enhanced without impairing user operability when executing an automatic communication parameter setting processing. A communication apparatus which configures a network serves as a providing apparatus which provides communication parameters to a receiving apparatus which receives the provided communication parameters. At this time, whether or not an... Agent: Canon Kabushiki Kaisha
20110170687 - Content decoding apparatus, content decoding method and integrated circuit: The content decrypting apparatus 2000 of the present invention stores a chaining value generated during decryption of the last ciphertext block of a chunk in association with a content type and a frame number to an inter-chunk chaining value holding unit 216. When decrypting the first ciphertext block of a... Agent:
20110170688 - Client-side protection of broadcast or multicast content for non-real-time playback: A system and method are disclosed for providing client-side protection of broadcast or multicast multimedia content for non-real-time playback. A set-top box function receives a request to record multimedia content and determines whether recording of the multimedia content is restricted. Upon receiving the multimedia content, the set-top box decrypts the... Agent: Qurio Holdings, Inc.
20110170689 - Terminal and method for processing encrypted message: A terminal may include a memory to store first encryption information applied to the handheld terminal and second encryption information corresponding to a phone number of another party's terminal, and a control unit to encrypt a message using the first encryption information and the second encryption information stored in the... Agent: Pantech Co., Ltd.
20110170690 - Secure orthogonal frequency multiplexed optical communications: The invention provides a system and method for secure communication that involve encoding and transmitting an optical orthogonal frequency division multiplexed (OFDM) signal. Each subcarrier of an optical carrier in OFDM transmission is modulated with data individually, and a variety of data format are used, such as QPSK, OOK, QAM,... Agent: Celight, Inc.
20110170691 - Protection of a ciphering key against unidirectional attacks: A method for protecting a key implemented, by an electronic circuit, in a symmetrical algorithm for ciphering or deciphering a message, including the steps of: selecting in non-deterministic fashion a pair of different masks from a set of at least four different masks, the masks having the property of representing... Agent: Stmicroelectronics (rousset) Sas
20110170692 - Method and system for establishing cryptographic communications between a remote device and a medical device: A method and system establishing cryptographic communications between a remote device and a medical device, with the medical device having less processing power than the remote device are disclosed. The method may comprise establishing unencrypted communication between the remote device and the medical device, generating an asymmetric key pair by... Agent: Roche Diagnostics International Ltd.
20110170693 - Stateless method and system for providing location information of target device: A method of providing a location of a target device includes receiving a first location reference request from the target device at a first location server, generating a first location reference in response to the first request, and including the first location reference in a second location reference request to... Agent: Andrew LLC
20110170694 - Hierarchical key management for secure communications in multimedia communication system: In a communication system wherein a first computing device is configured to perform a key management function for first user equipment and a second computing device is configured to perform a key management function for second user equipment, wherein the first user equipment seeks to initiate communication with the second... Agent:
20110170696 - System and method for secure access: The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote... Agent:
20110170695 - Time-bin polarization format exchange technique for entangled optical source: The system of the present invention generates a couple of photons which have different wavelength and inputs each of the photons into the asymmetric Mach-Zehnder interferometer to obtain time-bin entangled state. It provides polarization information with one part of the photons. Then it can obtain hybrid quantum entanglement. The system... Agent: Nec Corporation
20110170697 - Ternary and multi-value digital signal scramblers, decramblers and sequence generators: Reversible and self reversing multi-value scrambling functions created by applying multi-value inverters are disclosed. The generation of possible multi-value inverters is also presented. Corresponding multi-value descrambling functions are also disclosed. The multi-value functions are used in circuits that scramble and descramble multi-value signals. The multi-value functions can also be used... Agent: Ternarylogic LLC07/07/2011 > 9 patent applications in 8 patent subcategories. category listing
20110164745 - Secure compressive sampling using codebook of sampling matrices: In one aspect, a compressive sampling encoder comprises matrix determination circuitry configured to determine a particular sampling matrix selected from a codebook comprising a plurality of sampling matrices. The compressive sampling encoder further comprises sampling circuitry coupled to the matrix determination circuitry and configured to apply the particular sampling matrix... Agent:
20110164746 - Maintaining privacy during user profiling: Systems, methods, and computer storage media having computer-executable instructions embodied thereon that maintain privacy during user profiling are provided. A profiling service receives, from a first device, rules for profiling a user. The rules were encrypted using a private key. The profiling service also receives, from a second device, user... Agent: Microsoft Corporation
20110164747 - Method to enforce by a management center the access rules for a broadcast product: A method to enforce by a management center access rules for a broadcast product accessed by an access key, the management center managing a plurality of Boolean positive and negative attributes, comprising the steps: associating one positive Boolean attribute to a receiver entitled to the attribute and loading the same;... Agent: Nagravision S.a.
20110164748 - Packaging film for product authentication, authentication method and system: A packaging film which contains pigment particles randomly distributed in a low surface-area density is used for the authentication of products. An imaging device is used to record a first digital image of a packaged product. The positional coordinates, and optionally the color values, of the pigment particles contained in... Agent:
20110164750 - Method for communicating in a network, a communication device and a system therefor: The present invention relates to a communication system comprising a first node and second node adapted for communicating in a network, wherein the first node comprises a first list of keying materials including a plurality of keying materials, wherein the second node comprises a second list of keying materials including... Agent: Koninklijke Phillips Electronics N.v.
20110164749 - System and method for secure transaction of data between a wireless communication device and a server: The present invention provides a system and method for a set of Extensible Authentication Protocols (EAPs) that can serve Confidentiality, Authentication, Authorization and Accounting (CAAA) issues at an affordable cost. According to one embodiment of the invention, a system and method is provided to generate random sequences (through prime numbers)... Agent:
20110164751 - System and method for a secure synchronization between a wireless communication device and a server: The present invention provides a system and method for designing secure synchronization protocols in mobile communication by using Deterministic Random Number Generator (DRNG) through linear operators without using multi-precision integers. It also provides an efficient way to generate a huge size collection of pseudorandom numbers with a less computational complexity... Agent:
20110164752 - Detection of stale encryption policy by group members: Various techniques that allow group members to detect the use of stale encryption policy by other group members are disclosed. One method involves receiving a message from a first group member via a network. The message is received by a second group member. The method then detects that the first... Agent:
20110164753 - Digital rights management for media streams: This document describes techniques and apparatuses enabling application of digital rights management (DRM) to media streams. In one embodiment, three license levels are used to protect numerous television channels without undue use of computing resources.... Agent: Microsoft CorporationPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.39905 seconds